Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-6232 (GCVE-0-2024-6232)
Vulnerability from cvelistv5 – Published: 2024-09-03 12:29 – Updated: 2025-11-03 22:32- CWE-1333 - Inefficient Regular Expression Complexity
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Python Software Foundation | CPython |
Affected:
0 , < 3.8.20
(python)
Affected: 3.9.0 , < 3.9.20 (python) Affected: 3.10.0 , < 3.10.15 (python) Affected: 3.11.0 , < 3.11.10 (python) Affected: 3.12.0 , < 3.12.6 (python) Affected: 3.13.0a1 , < 3.13.0rc2 (python) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:python:cpython:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cpython",
"vendor": "python",
"versions": [
{
"lessThan": "3.8.20",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "3.9.20",
"status": "affected",
"version": "3.9.0",
"versionType": "custom"
},
{
"lessThan": "3.10.15",
"status": "affected",
"version": "3.10.0",
"versionType": "custom"
},
{
"lessThan": "3.11.10",
"status": "affected",
"version": "3.11.0",
"versionType": "custom"
},
{
"lessThan": "3.12.6",
"status": "affected",
"version": "3.12.0",
"versionType": "custom"
},
{
"lessThan": "3.13.0rc2",
"status": "affected",
"version": "3.13.0a1",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-6232",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T15:24:31.176254Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-20T18:02:26.275Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T22:32:42.630Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/09/03/5"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241018-0007/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPython",
"repo": "https://github.com/python/cpython",
"vendor": "Python Software Foundation",
"versions": [
{
"lessThan": "3.8.20",
"status": "affected",
"version": "0",
"versionType": "python"
},
{
"lessThan": "3.9.20",
"status": "affected",
"version": "3.9.0",
"versionType": "python"
},
{
"lessThan": "3.10.15",
"status": "affected",
"version": "3.10.0",
"versionType": "python"
},
{
"lessThan": "3.11.10",
"status": "affected",
"version": "3.11.0",
"versionType": "python"
},
{
"lessThan": "3.12.6",
"status": "affected",
"version": "3.12.0",
"versionType": "python"
},
{
"lessThan": "3.13.0rc2",
"status": "affected",
"version": "3.13.0a1",
"versionType": "python"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Elias Joakim Myllym\u00e4ki"
},
{
"lang": "en",
"type": "coordinator",
"value": "Seth Larson"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Seth Larson"
},
{
"lang": "en",
"type": "remediation reviewer",
"value": "Gregory P. Smith"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003eThere is a MEDIUM severity vulnerability affecting CPython.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.\u0026nbsp; \u003c/div\u003e"
}
],
"value": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1333",
"description": "CWE-1333 Inefficient Regular Expression Complexity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-31T19:54:59.572Z",
"orgId": "28c92f92-d60d-412d-b760-e73465c3df22",
"shortName": "PSF"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/pull/121286"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/python/cpython/issues/121285"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877"
},
{
"tags": [
"patch"
],
"url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Regular-expression DoS when parsing TarFile headers",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "28c92f92-d60d-412d-b760-e73465c3df22",
"assignerShortName": "PSF",
"cveId": "CVE-2024-6232",
"datePublished": "2024-09-03T12:29:00.102Z",
"dateReserved": "2024-06-20T21:01:55.524Z",
"dateUpdated": "2025-11-03T22:32:42.630Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.12.5\", \"matchCriteriaId\": \"5621585D-59F4-4B27-9980-E7602EA0B750\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BA51E41-D221-431F-870F-536AF2867B50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:alpha1:*:*:*:*:*:*\", \"matchCriteriaId\": \"978582FF-B8F3-479F-AE77-359E9AEE6F23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:alpha2:*:*:*:*:*:*\", \"matchCriteriaId\": \"84E3F62C-7218-4DC3-8473-8A576739643A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:alpha3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FD15706-B8BC-4801-9F93-06771F2E12C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:alpha4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FDC359F-E8ED-4777-83FB-1EC63F095CBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:alpha5:*:*:*:*:*:*\", \"matchCriteriaId\": \"6893BDDE-4D90-4592-8701-C6B3FFEB0CFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:alpha6:*:*:*:*:*:*\", \"matchCriteriaId\": \"E316F712-F03A-4378-8192-D1640819698B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:beta1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8566F034-27CB-422E-950B-DCAA926CF64F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"EACCE6C3-7701-4966-9D88-E949C82FCA46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4853BF2-9C27-465F-9840-5B37013C9F74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"B266541A-E877-4CAD-A1EF-08A069441F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:python:python:3.13.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8384A34C-50CD-439C-A2BB-DEA6161342C1\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"There is a MEDIUM severity vulnerability affecting CPython.\\n\\n\\n\\n\\n\\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de gravedad MEDIA que afecta a CPython. Las expresiones regulares que permit\\u00edan un retroceso excesivo durante el an\\u00e1lisis de cabeceras tarfile.TarFile son vulnerables a ReDoS a trav\\u00e9s de archivos tar manipulados espec\\u00edficamente.\"}]",
"id": "CVE-2024-6232",
"lastModified": "2024-11-21T09:49:14.903",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-09-03T13:15:05.363",
"references": "[{\"url\": \"https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06\", \"source\": \"cna@python.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4\", \"source\": \"cna@python.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d\", \"source\": \"cna@python.org\"}, {\"url\": \"https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877\", \"source\": \"cna@python.org\"}, {\"url\": \"https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf\", \"source\": \"cna@python.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373\", \"source\": \"cna@python.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/python/cpython/issues/121285\", \"source\": \"cna@python.org\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://github.com/python/cpython/pull/121286\", \"source\": \"cna@python.org\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/\", \"source\": \"cna@python.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/09/03/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20241018-0007/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cna@python.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"cna@python.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1333\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1333\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-6232\",\"sourceIdentifier\":\"cna@python.org\",\"published\":\"2024-09-03T13:15:05.363\",\"lastModified\":\"2025-11-03T23:17:30.710\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a MEDIUM severity vulnerability affecting CPython.\\n\\n\\n\\n\\n\\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de gravedad MEDIA que afecta a CPython. Las expresiones regulares que permit\u00edan un retroceso excesivo durante el an\u00e1lisis de cabeceras tarfile.TarFile son vulnerables a ReDoS a trav\u00e9s de archivos tar manipulados espec\u00edficamente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cna@python.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.8.20\",\"matchCriteriaId\":\"B475FA53-D1F3-44C8-80CD-0CEA88129109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9.0\",\"versionEndExcluding\":\"3.9.20\",\"matchCriteriaId\":\"9365E878-106E-49B6-98FC-9FA339CD5216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.10.0\",\"versionEndExcluding\":\"3.10.15\",\"matchCriteriaId\":\"BFD756EB-DF07-4485-A2AA-59FBD7260A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11.0\",\"versionEndExcluding\":\"3.11.10\",\"matchCriteriaId\":\"9EE0E5D8-452F-4862-9C23-23AC1DDEFB1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.12.0\",\"versionEndExcluding\":\"3.12.6\",\"matchCriteriaId\":\"5D4E662B-59E4-495E-941E-2246D2168B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA51E41-D221-431F-870F-536AF2867B50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"978582FF-B8F3-479F-AE77-359E9AEE6F23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E3F62C-7218-4DC3-8473-8A576739643A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD15706-B8BC-4801-9F93-06771F2E12C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:alpha4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FDC359F-E8ED-4777-83FB-1EC63F095CBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6893BDDE-4D90-4592-8701-C6B3FFEB0CFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:alpha6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E316F712-F03A-4378-8192-D1640819698B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8566F034-27CB-422E-950B-DCAA926CF64F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EACCE6C3-7701-4966-9D88-E949C82FCA46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4853BF2-9C27-465F-9840-5B37013C9F74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B266541A-E877-4CAD-A1EF-08A069441F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.13.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8384A34C-50CD-439C-A2BB-DEA6161342C1\"}]}]}],\"references\":[{\"url\":\"https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4\",\"source\":\"cna@python.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06\",\"source\":\"cna@python.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4\",\"source\":\"cna@python.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d\",\"source\":\"cna@python.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877\",\"source\":\"cna@python.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf\",\"source\":\"cna@python.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373\",\"source\":\"cna@python.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/python/cpython/issues/121285\",\"source\":\"cna@python.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://github.com/python/cpython/pull/121286\",\"source\":\"cna@python.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/\",\"source\":\"cna@python.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/09/03/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20241018-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2024/09/03/5\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20241018-0007/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-10-18T13:07:45.640Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-6232\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-04T15:24:31.176254Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:python:cpython:*:*:*:*:*:*:*:*\"], \"vendor\": \"python\", \"product\": \"cpython\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.8.20\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.9.0\", \"lessThan\": \"3.9.20\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.10.0\", \"lessThan\": \"3.10.15\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.11.0\", \"lessThan\": \"3.11.10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.12.0\", \"lessThan\": \"3.12.6\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.13.0a1\", \"lessThan\": \"3.13.0rc2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-03T13:50:16.881Z\"}}], \"cna\": {\"title\": \"Regular-expression DoS when parsing TarFile headers\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Elias Joakim Myllym\\u00e4ki\"}, {\"lang\": \"en\", \"type\": \"coordinator\", \"value\": \"Seth Larson\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Seth Larson\"}, {\"lang\": \"en\", \"type\": \"remediation reviewer\", \"value\": \"Gregory P. Smith\"}], \"affected\": [{\"repo\": \"https://github.com/python/cpython\", \"vendor\": \"Python Software Foundation\", \"product\": \"CPython\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.8.20\", \"versionType\": \"python\"}, {\"status\": \"affected\", \"version\": \"3.9.0\", \"lessThan\": \"3.9.20\", \"versionType\": \"python\"}, {\"status\": \"affected\", \"version\": \"3.10.0\", \"lessThan\": \"3.10.15\", \"versionType\": \"python\"}, {\"status\": \"affected\", \"version\": \"3.11.0\", \"lessThan\": \"3.11.10\", \"versionType\": \"python\"}, {\"status\": \"affected\", \"version\": \"3.12.0\", \"lessThan\": \"3.12.6\", \"versionType\": \"python\"}, {\"status\": \"affected\", \"version\": \"3.13.0a1\", \"lessThan\": \"3.13.0rc2\", \"versionType\": \"python\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://github.com/python/cpython/pull/121286\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/issues/121285\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4\", \"tags\": [\"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"There is a MEDIUM severity vulnerability affecting CPython.\\n\\n\\n\\n\\n\\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cdiv\u003eThere is a MEDIUM severity vulnerability affecting CPython.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.\u0026nbsp; \u003c/div\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1333\", \"description\": \"CWE-1333 Inefficient Regular Expression Complexity\"}]}], \"providerMetadata\": {\"orgId\": \"28c92f92-d60d-412d-b760-e73465c3df22\", \"shortName\": \"PSF\", \"dateUpdated\": \"2025-01-31T19:54:59.572Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-6232\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-20T18:02:26.275Z\", \"dateReserved\": \"2024-06-20T21:01:55.524Z\", \"assignerOrgId\": \"28c92f92-d60d-412d-b760-e73465c3df22\", \"datePublished\": \"2024-09-03T12:29:00.102Z\", \"assignerShortName\": \"PSF\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
RHSA-2025:1750
Vulnerability from csaf_redhat - Published: 2025-02-24 01:20 - Updated: 2025-11-21 19:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:1750",
"url": "https://access.redhat.com/errata/RHSA-2025:1750"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1750.json"
}
],
"title": "Red Hat Security Advisory: python3 security update",
"tracking": {
"current_release_date": "2025-11-21T19:28:33+00:00",
"generator": {
"date": "2025-11-21T19:28:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:1750",
"initial_release_date": "2025-02-24T01:20:08+00:00",
"revision_history": [
{
"date": "2025-02-24T01:20:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-02-24T01:20:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:28:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-21.el7_9.1.src",
"product": {
"name": "python3-0:3.6.8-21.el7_9.1.src",
"product_id": "python3-0:3.6.8-21.el7_9.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-21.el7_9.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-21.el7_9.1.x86_64",
"product": {
"name": "python3-0:3.6.8-21.el7_9.1.x86_64",
"product_id": "python3-0:3.6.8-21.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-21.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"product": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"product_id": "python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-21.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"product": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"product_id": "python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-21.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"product": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"product_id": "python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-21.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"product": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"product_id": "python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-21.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"product": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"product_id": "python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-21.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-21.el7_9.1.x86_64",
"product": {
"name": "python3-test-0:3.6.8-21.el7_9.1.x86_64",
"product_id": "python3-test-0:3.6.8-21.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-21.el7_9.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"product": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"product_id": "python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-21.el7_9.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-21.el7_9.1.i686",
"product": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.i686",
"product_id": "python3-libs-0:3.6.8-21.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-21.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"product": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"product_id": "python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-21.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.6.8-21.el7_9.1.i686",
"product": {
"name": "python3-0:3.6.8-21.el7_9.1.i686",
"product_id": "python3-0:3.6.8-21.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-21.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-21.el7_9.1.i686",
"product": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.i686",
"product_id": "python3-debug-0:3.6.8-21.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-21.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-21.el7_9.1.i686",
"product": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.i686",
"product_id": "python3-devel-0:3.6.8-21.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-21.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-21.el7_9.1.i686",
"product": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.i686",
"product_id": "python3-idle-0:3.6.8-21.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-21.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-21.el7_9.1.i686",
"product": {
"name": "python3-test-0:3.6.8-21.el7_9.1.i686",
"product_id": "python3-test-0:3.6.8-21.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-21.el7_9.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"product": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"product_id": "python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-21.el7_9.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-21.el7_9.1.ppc64le",
"product": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc64le",
"product_id": "python3-0:3.6.8-21.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-21.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"product": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"product_id": "python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-21.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"product": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"product_id": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-21.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"product": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"product_id": "python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-21.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"product": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"product_id": "python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-21.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"product": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"product_id": "python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-21.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"product": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"product_id": "python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-21.el7_9.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"product": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"product_id": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-21.el7_9.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-21.el7_9.1.ppc64",
"product": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc64",
"product_id": "python3-0:3.6.8-21.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-21.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"product": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"product_id": "python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-21.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"product": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"product_id": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-21.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"product": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"product_id": "python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-21.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"product": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"product_id": "python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-21.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"product": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"product_id": "python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-21.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc64",
"product": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc64",
"product_id": "python3-test-0:3.6.8-21.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-21.el7_9.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"product": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"product_id": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-21.el7_9.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc",
"product": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc",
"product_id": "python3-libs-0:3.6.8-21.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-21.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"product": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"product_id": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-21.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.6.8-21.el7_9.1.ppc",
"product": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc",
"product_id": "python3-0:3.6.8-21.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-21.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc",
"product": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc",
"product_id": "python3-debug-0:3.6.8-21.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-21.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc",
"product": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc",
"product_id": "python3-devel-0:3.6.8-21.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-21.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc",
"product": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc",
"product_id": "python3-idle-0:3.6.8-21.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-21.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc",
"product": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc",
"product_id": "python3-test-0:3.6.8-21.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-21.el7_9.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"product": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"product_id": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-21.el7_9.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-21.el7_9.1.s390x",
"product": {
"name": "python3-0:3.6.8-21.el7_9.1.s390x",
"product_id": "python3-0:3.6.8-21.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-21.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-21.el7_9.1.s390x",
"product": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.s390x",
"product_id": "python3-libs-0:3.6.8-21.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-21.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"product": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"product_id": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-21.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-21.el7_9.1.s390x",
"product": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.s390x",
"product_id": "python3-debug-0:3.6.8-21.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-21.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-21.el7_9.1.s390x",
"product": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.s390x",
"product_id": "python3-devel-0:3.6.8-21.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-21.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-21.el7_9.1.s390x",
"product": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.s390x",
"product_id": "python3-idle-0:3.6.8-21.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-21.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-21.el7_9.1.s390x",
"product": {
"name": "python3-test-0:3.6.8-21.el7_9.1.s390x",
"product_id": "python3-test-0:3.6.8-21.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-21.el7_9.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"product": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"product_id": "python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-21.el7_9.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-21.el7_9.1.s390",
"product": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.s390",
"product_id": "python3-libs-0:3.6.8-21.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-21.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"product": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"product_id": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-21.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.6.8-21.el7_9.1.s390",
"product": {
"name": "python3-0:3.6.8-21.el7_9.1.s390",
"product_id": "python3-0:3.6.8-21.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-21.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-21.el7_9.1.s390",
"product": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.s390",
"product_id": "python3-debug-0:3.6.8-21.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-21.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-21.el7_9.1.s390",
"product": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.s390",
"product_id": "python3-devel-0:3.6.8-21.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-21.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-21.el7_9.1.s390",
"product": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.s390",
"product_id": "python3-idle-0:3.6.8-21.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-21.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-21.el7_9.1.s390",
"product": {
"name": "python3-test-0:3.6.8-21.el7_9.1.s390",
"product_id": "python3-test-0:3.6.8-21.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-21.el7_9.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"product": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"product_id": "python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-21.el7_9.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-0:3.6.8-21.el7_9.1.src"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.src"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-test-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-21.el7_9.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.src",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.src",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-24T01:20:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.src",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.src",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1750"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.src",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.src",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.src",
"7Server-ELS:python3-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"7Server-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.src",
"7Server-optional-ELS:python3-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-debug-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-debuginfo-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-devel-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-idle-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-libs-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-test-0:3.6.8-21.el7_9.1.x86_64",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.i686",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.ppc64le",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.s390x",
"7Server-optional-ELS:python3-tkinter-0:3.6.8-21.el7_9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_8446
Vulnerability from csaf_redhat - Published: 2024-10-24 12:33 - Updated: 2024-11-13 16:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.9 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8446",
"url": "https://access.redhat.com/errata/RHSA-2024:8446"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8446.json"
}
],
"title": "Red Hat Security Advisory: python3.9 security update",
"tracking": {
"current_release_date": "2024-11-13T16:34:51+00:00",
"generator": {
"date": "2024-11-13T16:34:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8446",
"initial_release_date": "2024-10-24T12:33:44+00:00",
"revision_history": [
{
"date": "2024-10-24T12:33:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-24T12:33:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:34:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"product": {
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"product_id": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-unversioned-command@3.9.18-3.el9_4.6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.9-0:3.9.18-3.el9_4.6.src",
"product": {
"name": "python3.9-0:3.9.18-3.el9_4.6.src",
"product_id": "python3.9-0:3.9.18-3.el9_4.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9@3.9.18-3.el9_4.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.18-3.el9_4.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src"
},
"product_reference": "python3.9-0:3.9.18-3.el9_4.6.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.18-3.el9_4.6.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src"
},
"product_reference": "python3.9-0:3.9.18-3.el9_4.6.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.18-3.el9_4.6.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src"
},
"product_reference": "python3.9-0:3.9.18-3.el9_4.6.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-24T12:33:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8446"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_7415
Vulnerability from csaf_redhat - Published: 2024-10-01 02:34 - Updated: 2024-12-18 03:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7415",
"url": "https://access.redhat.com/errata/RHSA-2024:7415"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7415.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2024-12-18T03:40:01+00:00",
"generator": {
"date": "2024-12-18T03:40:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:7415",
"initial_release_date": "2024-10-01T02:34:25+00:00",
"revision_history": [
{
"date": "2024-10-01T02:34:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-01T02:34:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T03:40:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.src",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.src",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-01T02:34:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7415"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-01T02:34:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7415"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
}
]
}
RHSA-2024_8490
Vulnerability from csaf_redhat - Published: 2024-10-28 00:29 - Updated: 2024-11-13 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3 is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8490",
"url": "https://access.redhat.com/errata/RHSA-2024:8490"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8490.json"
}
],
"title": "Red Hat Security Advisory: python3 security update",
"tracking": {
"current_release_date": "2024-11-13T16:35:12+00:00",
"generator": {
"date": "2024-11-13T16:35:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8490",
"initial_release_date": "2024-10-28T00:29:23+00:00",
"revision_history": [
{
"date": "2024-10-28T00:29:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-28T00:29:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:35:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-10.el7_7.1.src",
"product": {
"name": "python3-0:3.6.8-10.el7_7.1.src",
"product_id": "python3-0:3.6.8-10.el7_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-10.el7_7.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-10.el7_7.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-test-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-test-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-10.el7_7.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-test-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-test-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:29:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8490"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_8504
Vulnerability from csaf_redhat - Published: 2024-10-28 08:43 - Updated: 2024-11-13 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the python39:3.9 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8504",
"url": "https://access.redhat.com/errata/RHSA-2024:8504"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8504.json"
}
],
"title": "Red Hat Security Advisory: python39:3.9 security update",
"tracking": {
"current_release_date": "2024-11-13T16:35:22+00:00",
"generator": {
"date": "2024-11-13T16:35:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8504",
"initial_release_date": "2024-10-28T08:43:14+00:00",
"revision_history": [
{
"date": "2024-10-28T08:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-28T08:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:35:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python39:3.9:8080020241016061730:93c2fc2f",
"product": {
"name": "python39:3.9:8080020241016061730:93c2fc2f",
"product_id": "python39:3.9:8080020241016061730:93c2fc2f",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/python39@3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"product": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"product_id": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-doc@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product_id": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product_id": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip-wheel@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch",
"product": {
"name": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch",
"product_id": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-rpm-macros@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"product": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"product_id": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools@50.3.2-6.module%2Bel8.8.0%2B22158%2B89b6fb7b?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"product": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"product_id": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools-wheel@50.3.2-6.module%2Bel8.8.0%2B22158%2B89b6fb7b?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"product": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"product_id": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.25.10-4.module%2Bel8.5.0%2B11712%2Bea2d2be1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product_id": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product_id": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"product": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"product_id": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src",
"product": {
"name": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src",
"product_id": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=src"
}
}
},
{
"category": "product_version",
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"product": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"product_id": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"product": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"product_id": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"product": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"product_id": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-4.module%2Bel8.5.0%2B11712%2Bea2d2be1?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"product": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"product_id": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"product": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"product_id": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pip@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src",
"product": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src",
"product_id": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-setuptools@50.3.2-6.module%2Bel8.8.0%2B22158%2B89b6fb7b?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_id": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_id": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_id": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_id": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_id": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64",
"product_id": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_id": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_id": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_id": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_id": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_id": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_id": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_id": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le",
"product_id": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_id": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_id": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_id": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_id": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_id": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_id": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_id": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x",
"product_id": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_id": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_id": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_id": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_id": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_id": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_id": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_id": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64",
"product_id": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_id": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_id": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
"product_reference": "python39:3.9:8080020241016061730:93c2fc2f",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src"
},
"product_reference": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src"
},
"product_reference": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64"
},
"product_reference": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le"
},
"product_reference": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x"
},
"product_reference": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64"
},
"product_reference": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64"
},
"product_reference": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le"
},
"product_reference": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x"
},
"product_reference": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64"
},
"product_reference": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64"
},
"product_reference": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le"
},
"product_reference": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x"
},
"product_reference": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64"
},
"product_reference": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64"
},
"product_reference": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le"
},
"product_reference": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x"
},
"product_reference": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64"
},
"product_reference": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64"
},
"product_reference": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le"
},
"product_reference": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x"
},
"product_reference": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64"
},
"product_reference": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch"
},
"product_reference": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch"
},
"product_reference": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch"
},
"product_reference": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64"
},
"product_reference": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le"
},
"product_reference": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x"
},
"product_reference": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64"
},
"product_reference": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64"
},
"product_reference": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le"
},
"product_reference": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x"
},
"product_reference": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64"
},
"product_reference": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch"
},
"product_reference": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src"
},
"product_reference": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8080020241016061730:93c2fc2f as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T08:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8504"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.8.0.Z.EUS:python39:3.9:8080020241016061730:93c2fc2f:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8504
Vulnerability from csaf_redhat - Published: 2024-10-28 08:43 - Updated: 2025-11-21 19:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the python39:3.9 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8504",
"url": "https://access.redhat.com/errata/RHSA-2024:8504"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8504.json"
}
],
"title": "Red Hat Security Advisory: python39:3.9 security update",
"tracking": {
"current_release_date": "2025-11-21T19:15:03+00:00",
"generator": {
"date": "2025-11-21T19:15:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8504",
"initial_release_date": "2024-10-28T08:43:14+00:00",
"revision_history": [
{
"date": "2024-10-28T08:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-28T08:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:15:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"product": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src (python39:3.9)",
"product_id": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src::python39:3.9",
"product": {
"name": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src (python39:3.9)",
"product_id": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"product": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src (python39:3.9)",
"product_id": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"product": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src (python39:3.9)",
"product_id": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"product": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src (python39:3.9)",
"product_id": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-4.module%2Bel8.5.0%2B11712%2Bea2d2be1?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"product": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src (python39:3.9)",
"product_id": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=src\u0026epoch=1\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src::python39:3.9",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src (python39:3.9)",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"product": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src (python39:3.9)",
"product_id": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pip@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src::python39:3.9",
"product": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src (python39:3.9)",
"product_id": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-setuptools@50.3.2-6.module%2Bel8.8.0%2B22158%2B89b6fb7b?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch (python39:3.9)",
"product_id": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-doc@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"product": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9)",
"product_id": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"product": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9)",
"product_id": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip-wheel@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch::python39:3.9",
"product": {
"name": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch (python39:3.9)",
"product_id": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-rpm-macros@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"product": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch (python39:3.9)",
"product_id": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools@50.3.2-6.module%2Bel8.8.0%2B22158%2B89b6fb7b?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"product": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch (python39:3.9)",
"product_id": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools-wheel@50.3.2-6.module%2Bel8.8.0%2B22158%2B89b6fb7b?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"product": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch (python39:3.9)",
"product_id": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.25.10-4.module%2Bel8.5.0%2B11712%2Bea2d2be1?arch=noarch\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9)",
"product_id": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026epoch=1\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9)",
"product_id": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026epoch=1\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9)",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9)",
"product_id": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9)",
"product_id": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9)",
"product_id": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64 (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9)",
"product_id": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9)",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9)",
"product_id": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9)",
"product_id": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9)",
"product_id": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9)",
"product_id": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9)",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9)",
"product_id": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9)",
"product_id": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9)",
"product_id": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9)",
"product_id": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9)",
"product_id": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9)",
"product_id": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9)",
"product_id": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9)",
"product_id": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64 (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-5.module%2Bel8.7.0%2B16654%2B645aad7f?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9)",
"product_id": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.16-1.module%2Bel8.8.0%2B22374%2B62aa8e74.4?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8080020241016061730:93c2fc2f"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src::python39:3.9"
},
"product_reference": "mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9"
},
"product_reference": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src::python39:3.9"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9"
},
"product_reference": "python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9"
},
"product_reference": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9"
},
"product_reference": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch::python39:3.9"
},
"product_reference": "python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9"
},
"product_reference": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9"
},
"product_reference": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9"
},
"product_reference": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9"
},
"product_reference": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src::python39:3.9"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T08:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8504"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debuginfo-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-debugsource-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-devel-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idle-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-libs-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-mod_wsgi-0:4.7.1-5.module+el8.7.0+16654+645aad7f.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-rpm-macros-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-test-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-tkinter-0:3.9.16-1.module+el8.8.0+22374+62aa8e74.4.x86_64::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-setuptools-0:50.3.2-6.module+el8.8.0+22158+89b6fb7b.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.8.0.Z.EUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_9450
Vulnerability from csaf_redhat - Published: 2024-11-12 10:29 - Updated: 2024-11-13 16:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9450",
"url": "https://access.redhat.com/errata/RHSA-2024:9450"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9450.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2024-11-13T16:36:12+00:00",
"generator": {
"date": "2024-11-13T16:36:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:9450",
"initial_release_date": "2024-11-12T10:29:44+00:00",
"revision_history": [
{
"date": "2024-11-12T10:29:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:29:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:36:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.src",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.src",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:29:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9450"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_9451
Vulnerability from csaf_redhat - Published: 2024-11-12 10:25 - Updated: 2024-11-13 16:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.12 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the \"python3.12\" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the \"python3.12-\" prefix.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9451",
"url": "https://access.redhat.com/errata/RHSA-2024:9451"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9451.json"
}
],
"title": "Red Hat Security Advisory: python3.12 security update",
"tracking": {
"current_release_date": "2024-11-13T16:36:22+00:00",
"generator": {
"date": "2024-11-13T16:36:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:9451",
"initial_release_date": "2024-11-12T10:25:20+00:00",
"revision_history": [
{
"date": "2024-11-12T10:25:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:25:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:36:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.src",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.src",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:25:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9451"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:6909
Vulnerability from csaf_redhat - Published: 2024-09-23 02:01 - Updated: 2025-11-21 19:12Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.9 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6909",
"url": "https://access.redhat.com/errata/RHSA-2024:6909"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6909.json"
}
],
"title": "Red Hat Security Advisory: python3.9 security update",
"tracking": {
"current_release_date": "2025-11-21T19:12:33+00:00",
"generator": {
"date": "2025-11-21T19:12:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:6909",
"initial_release_date": "2024-09-23T02:01:43+00:00",
"revision_history": [
{
"date": "2024-09-23T02:01:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-23T02:01:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:12:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"product": {
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"product_id": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-unversioned-command@3.9.16-1.el9_2.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.9-0:3.9.16-1.el9_2.8.src",
"product": {
"name": "python3.9-0:3.9.16-1.el9_2.8.src",
"product_id": "python3.9-0:3.9.16-1.el9_2.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9@3.9.16-1.el9_2.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.16-1.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src"
},
"product_reference": "python3.9-0:3.9.16-1.el9_2.8.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.16-1.el9_2.8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src"
},
"product_reference": "python3.9-0:3.9.16-1.el9_2.8.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.16-1.el9_2.8.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src"
},
"product_reference": "python3.9-0:3.9.16-1.el9_2.8.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-23T02:01:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6909"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-23T02:01:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6909"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
}
]
}
RHSA-2024_9468
Vulnerability from csaf_redhat - Published: 2024-11-12 10:30 - Updated: 2024-11-13 16:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.9 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9468",
"url": "https://access.redhat.com/errata/RHSA-2024:9468"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9468.json"
}
],
"title": "Red Hat Security Advisory: python3.9 security update",
"tracking": {
"current_release_date": "2024-11-13T16:36:02+00:00",
"generator": {
"date": "2024-11-13T16:36:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:9468",
"initial_release_date": "2024-11-12T10:30:59+00:00",
"revision_history": [
{
"date": "2024-11-12T10:30:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:30:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:36:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.9-0:3.9.19-8.el9_5.1.src",
"product": {
"name": "python3.9-0:3.9.19-8.el9_5.1.src",
"product_id": "python3.9-0:3.9.19-8.el9_5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9@3.9.19-8.el9_5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"product": {
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"product_id": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-unversioned-command@3.9.19-8.el9_5.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.19-8.el9_5.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src"
},
"product_reference": "python3.9-0:3.9.19-8.el9_5.1.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.19-8.el9_5.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src"
},
"product_reference": "python3.9-0:3.9.19-8.el9_5.1.src",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.19-8.el9_5.1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src"
},
"product_reference": "python3.9-0:3.9.19-8.el9_5.1.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:30:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9468"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_8977
Vulnerability from csaf_redhat - Published: 2024-11-07 03:26 - Updated: 2024-11-13 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the python39:3.9 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8977",
"url": "https://access.redhat.com/errata/RHSA-2024:8977"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8977.json"
}
],
"title": "Red Hat Security Advisory: python39:3.9 security update",
"tracking": {
"current_release_date": "2024-11-13T16:35:07+00:00",
"generator": {
"date": "2024-11-13T16:35:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8977",
"initial_release_date": "2024-11-07T03:26:46+00:00",
"revision_history": [
{
"date": "2024-11-07T03:26:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-07T03:26:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:35:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python39:3.9:8040020241017072554:63cd9eba",
"product": {
"name": "python39:3.9:8040020241017072554:63cd9eba",
"product_id": "python39:3.9:8040020241017072554:63cd9eba",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/python39@3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"product": {
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_id": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-doc@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product": {
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_id": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip@20.2.4-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product": {
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_id": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip-wheel@20.2.4-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"product": {
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"product_id": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-rpm-macros@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"product": {
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"product_id": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools@50.3.2-3.module%2Bel8.4.0%2B22168%2B8a561f05.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"product": {
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"product_id": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools-wheel@50.3.2-3.module%2Bel8.4.0%2B22168%2B8a561f05.2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.25.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product": {
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_id": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel@0.35.1-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product": {
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_id": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel-wheel@0.35.1-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"product": {
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"product_id": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_id": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"product": {
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"product_id": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"product": {
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"product_id": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wheel@0.35.1-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"product": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"product_id": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"product": {
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"product_id": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pip@20.2.4-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"product": {
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"product_id": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-setuptools@50.3.2-3.module%2Bel8.4.0%2B22168%2B8a561f05.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product_id": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_id": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_id": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_id": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_id": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_id": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_id": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product_id": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product_id": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product_id": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_id": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_id": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product_id": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_id": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_id": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_id": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_id": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_id": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_id": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product_id": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product_id": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product_id": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_id": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_id": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
"product_reference": "python39:3.9:8040020241017072554:63cd9eba",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch"
},
"product_reference": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch"
},
"product_reference": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src"
},
"product_reference": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
"product_reference": "python39:3.9:8040020241017072554:63cd9eba",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le"
},
"product_reference": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le"
},
"product_reference": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le"
},
"product_reference": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le"
},
"product_reference": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le"
},
"product_reference": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le"
},
"product_reference": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le"
},
"product_reference": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch"
},
"product_reference": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch"
},
"product_reference": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le"
},
"product_reference": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le"
},
"product_reference": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src"
},
"product_reference": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
"product_reference": "python39:3.9:8040020241017072554:63cd9eba",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch"
},
"product_reference": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch"
},
"product_reference": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64"
},
"product_reference": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src"
},
"product_reference": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src"
},
"product_reference": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8040020241017072554:63cd9eba as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-07T03:26:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8977"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.AUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.4.0.Z.E4S:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.4.0.Z.TUS:python39:3.9:8040020241017072554:63cd9eba:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8359
Vulnerability from csaf_redhat - Published: 2024-10-23 10:28 - Updated: 2025-11-21 19:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the python39:3.9 and python39-devel:3.9 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8359",
"url": "https://access.redhat.com/errata/RHSA-2024:8359"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8359.json"
}
],
"title": "Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update",
"tracking": {
"current_release_date": "2025-11-21T19:14:54+00:00",
"generator": {
"date": "2025-11-21T19:14:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8359",
"initial_release_date": "2024-10-23T10:28:19+00:00",
"revision_history": [
{
"date": "2024-10-23T10:28:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-23T10:28:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:14:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-PyMySQL@0.10.1-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-chardet@3.0.4-19.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src::python39:3.9",
"product": {
"name": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src (python39:3.9)",
"product_id": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src::python39:3.9",
"product": {
"name": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src (python39:3.9)",
"product_id": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-idna@2.10-4.module%2Bel8.10.0%2B21815%2Bbb024982?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ply@3.11-10.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src::python39:3.9",
"product": {
"name": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src (python39:3.9)",
"product_id": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pycparser@2.20-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pysocks@1.7.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.0-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-toml@0.10.1-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src::python39:3.9",
"product": {
"name": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src (python39:3.9)",
"product_id": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-5.module%2Bel8.10.0%2B20443%2Bf0a692fe?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wheel@0.35.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026epoch=1\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src::python39:3.9",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src (python39:3.9)",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src::python39:3.9",
"product": {
"name": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src (python39:3.9)",
"product_id": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pip@20.2.4-9.module%2Bel8.10.0%2B21329%2B8d76b841?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src::python39:3.9",
"product": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src (python39:3.9)",
"product_id": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-setuptools@50.3.2-6.module%2Bel8.10.0%2B22183%2Bc898c0c1?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-six@1.15.0-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product": {
"name": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src (python39:3.9)",
"product_id": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pytest@6.0.2-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-attrs@20.3.0-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-iniconfig@1.1.1-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-more-itertools@8.5.0-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-packaging@20.4-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pluggy@0.13.1-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-py@1.10.0-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wcwidth@0.2.5-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product": {
"name": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9)",
"product_id": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pyparsing@2.4.7-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-PyMySQL@0.10.1-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-chardet@3.0.4-19.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch::python39:3.9",
"product": {
"name": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch (python39:3.9)",
"product_id": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idna@2.10-4.module%2Bel8.10.0%2B21815%2Bbb024982?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-doc@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"product": {
"name": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch (python39:3.9)",
"product_id": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip@20.2.4-9.module%2Bel8.10.0%2B21329%2B8d76b841?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"product": {
"name": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch (python39:3.9)",
"product_id": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip-wheel@20.2.4-9.module%2Bel8.10.0%2B21329%2B8d76b841?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-ply@3.11-10.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pycparser@2.20-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pysocks@1.7.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-requests@2.25.0-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch::python39:3.9",
"product": {
"name": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch (python39:3.9)",
"product_id": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-rpm-macros@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"product": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch (python39:3.9)",
"product_id": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools@50.3.2-6.module%2Bel8.10.0%2B22183%2Bc898c0c1?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"product": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch (python39:3.9)",
"product_id": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools-wheel@50.3.2-6.module%2Bel8.10.0%2B22183%2Bc898c0c1?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-six@1.15.0-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-toml@0.10.1-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch::python39:3.9",
"product": {
"name": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch (python39:3.9)",
"product_id": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.25.10-5.module%2Bel8.10.0%2B20443%2Bf0a692fe?arch=noarch\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel@0.35.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026epoch=1\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch (python39:3.9)",
"product_id": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel-wheel@0.35.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026epoch=1\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-attrs@20.3.0-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-iniconfig@1.1.1-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-more-itertools@8.5.0-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-packaging@20.4-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pluggy@0.13.1-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-py@1.10.0-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyparsing@2.4.7-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pytest@6.0.2-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product": {
"name": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9)",
"product_id": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wcwidth@0.2.5-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9)",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9)",
"product_id": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9)",
"product_id": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9)",
"product_id": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9)",
"product_id": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9)",
"product_id": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython-debugsource@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9)",
"product_id": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9)",
"product_id": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython-debuginfo@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39-devel:3.9",
"product": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39-devel:3.9)",
"product_id": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debug@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9)",
"product_id": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9)",
"product_id": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11-devel@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9)",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9)",
"product_id": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9)",
"product_id": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9)",
"product_id": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9)",
"product_id": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9)",
"product_id": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython-debugsource@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9)",
"product_id": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9)",
"product_id": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython-debuginfo@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39-devel:3.9",
"product": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39-devel:3.9)",
"product_id": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debug@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9)",
"product_id": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9)",
"product_id": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11-devel@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9)",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9)",
"product_id": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9)",
"product_id": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9)",
"product_id": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9)",
"product_id": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9)",
"product_id": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython-debugsource@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9)",
"product_id": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9)",
"product_id": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython-debuginfo@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39-devel:3.9",
"product": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39-devel:3.9)",
"product_id": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debug@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9)",
"product_id": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9)",
"product_id": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11-devel@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9)",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9)",
"product_id": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9)",
"product_id": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9)",
"product_id": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9)",
"product_id": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9)",
"product_id": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython-debugsource@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9)",
"product_id": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9)",
"product_id": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython-debuginfo@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39-devel:3.9",
"product": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39-devel:3.9)",
"product_id": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debug@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9)",
"product_id": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9)",
"product_id": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11-devel@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64\u0026rpmmod=python39-devel:3.9:8100020240927003152:d47b87a4"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src::python39:3.9"
},
"product_reference": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src::python39:3.9"
},
"product_reference": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src::python39:3.9"
},
"product_reference": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src::python39:3.9"
},
"product_reference": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src::python39:3.9"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch::python39:3.9"
},
"product_reference": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9"
},
"product_reference": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9"
},
"product_reference": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch::python39:3.9"
},
"product_reference": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9"
},
"product_reference": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9"
},
"product_reference": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch::python39:3.9"
},
"product_reference": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src::python39:3.9"
},
"product_reference": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src::python39:3.9"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src::python39:3.9"
},
"product_reference": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9"
},
"product_reference": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9"
},
"product_reference": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9"
},
"product_reference": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9"
},
"product_reference": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9"
},
"product_reference": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9"
},
"product_reference": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9"
},
"product_reference": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9"
},
"product_reference": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9"
},
"product_reference": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9"
},
"product_reference": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9"
},
"product_reference": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9"
},
"product_reference": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39-devel:3.9"
},
"product_reference": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39-devel:3.9"
},
"product_reference": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39-devel:3.9"
},
"product_reference": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39-devel:3.9"
},
"product_reference": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9"
},
"product_reference": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9"
},
"product_reference": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9"
},
"product_reference": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9"
},
"product_reference": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9"
},
"product_reference": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9"
},
"product_reference": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9"
},
"product_reference": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64 (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9"
},
"product_reference": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9"
},
"product_reference": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src (python39-devel:3.9) as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
},
"product_reference": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-23T10:28:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8359"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x::python39:3.9",
"AppStream-8.10.0.Z.MAIN.EUS:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64::python39:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch::python39-devel:3.9",
"CRB-8.10.0.Z.MAIN.EUS:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src::python39-devel:3.9"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8446
Vulnerability from csaf_redhat - Published: 2024-10-24 12:33 - Updated: 2025-11-21 19:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.9 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8446",
"url": "https://access.redhat.com/errata/RHSA-2024:8446"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8446.json"
}
],
"title": "Red Hat Security Advisory: python3.9 security update",
"tracking": {
"current_release_date": "2025-11-21T19:14:58+00:00",
"generator": {
"date": "2025-11-21T19:14:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8446",
"initial_release_date": "2024-10-24T12:33:44+00:00",
"revision_history": [
{
"date": "2024-10-24T12:33:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-24T12:33:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:14:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"product": {
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"product_id": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-unversioned-command@3.9.18-3.el9_4.6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.18-3.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"product": {
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"product_id": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.18-3.el9_4.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.9-0:3.9.18-3.el9_4.6.src",
"product": {
"name": "python3.9-0:3.9.18-3.el9_4.6.src",
"product_id": "python3.9-0:3.9.18-3.el9_4.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9@3.9.18-3.el9_4.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.18-3.el9_4.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src"
},
"product_reference": "python3.9-0:3.9.18-3.el9_4.6.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.18-3.el9_4.6.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src"
},
"product_reference": "python3.9-0:3.9.18-3.el9_4.6.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-test-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.18-3.el9_4.6.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src"
},
"product_reference": "python3.9-0:3.9.18-3.el9_4.6.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-24T12:33:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8446"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"BaseOS-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python-unversioned-command-0:3.9.18-3.el9_4.6.noarch",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-debug-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-devel-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-idle-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-libs-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-test-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3-tkinter-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-0:3.9.18-3.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debuginfo-0:3.9.18-3.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.9-debugsource-0:3.9.18-3.el9_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_8447
Vulnerability from csaf_redhat - Published: 2024-10-24 12:09 - Updated: 2024-11-13 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.12 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the \"python3.12\" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the \"python3.12-\" prefix.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8447",
"url": "https://access.redhat.com/errata/RHSA-2024:8447"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8447.json"
}
],
"title": "Red Hat Security Advisory: python3.12 security update",
"tracking": {
"current_release_date": "2024-11-13T16:35:02+00:00",
"generator": {
"date": "2024-11-13T16:35:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8447",
"initial_release_date": "2024-10-24T12:09:14+00:00",
"revision_history": [
{
"date": "2024-10-24T12:09:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-24T12:09:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:35:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.src",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.src",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-24T12:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8447"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:9450
Vulnerability from csaf_redhat - Published: 2024-11-12 10:29 - Updated: 2025-11-21 19:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9450",
"url": "https://access.redhat.com/errata/RHSA-2024:9450"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9450.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2025-11-21T19:16:22+00:00",
"generator": {
"date": "2025-11-21T19:16:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:9450",
"initial_release_date": "2024-11-12T10:29:44+00:00",
"revision_history": [
{
"date": "2024-11-12T10:29:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:29:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:16:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.src",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.src",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.9-7.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"product": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"product_id": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.9-7.el9_5.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:29:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9450"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.11-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debug-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debuginfo-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-debugsource-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-devel-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-idle-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-libs-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-test-0:3.11.9-7.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.11-tkinter-0:3.11.9-7.el9_5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:9451
Vulnerability from csaf_redhat - Published: 2024-11-12 10:25 - Updated: 2025-11-21 19:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.12 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the \"python3.12\" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the \"python3.12-\" prefix.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9451",
"url": "https://access.redhat.com/errata/RHSA-2024:9451"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9451.json"
}
],
"title": "Red Hat Security Advisory: python3.12 security update",
"tracking": {
"current_release_date": "2025-11-21T19:16:23+00:00",
"generator": {
"date": "2025-11-21T19:16:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:9451",
"initial_release_date": "2024-11-12T10:25:20+00:00",
"revision_history": [
{
"date": "2024-11-12T10:25:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:25:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:16:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.src",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.src",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.5-2.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"product": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"product_id": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.5-2.el9_5.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:25:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9451"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.12-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debug-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debuginfo-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-debugsource-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-devel-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-idle-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-libs-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-test-0:3.12.5-2.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.12-tkinter-0:3.12.5-2.el9_5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:9468
Vulnerability from csaf_redhat - Published: 2024-11-12 10:30 - Updated: 2025-11-21 19:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.9 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9468",
"url": "https://access.redhat.com/errata/RHSA-2024:9468"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9468.json"
}
],
"title": "Red Hat Security Advisory: python3.9 security update",
"tracking": {
"current_release_date": "2025-11-21T19:16:28+00:00",
"generator": {
"date": "2025-11-21T19:16:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:9468",
"initial_release_date": "2024-11-12T10:30:59+00:00",
"revision_history": [
{
"date": "2024-11-12T10:30:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-12T10:30:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:16:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.19-8.el9_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"product": {
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"product_id": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.19-8.el9_5.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.9-0:3.9.19-8.el9_5.1.src",
"product": {
"name": "python3.9-0:3.9.19-8.el9_5.1.src",
"product_id": "python3.9-0:3.9.19-8.el9_5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9@3.9.19-8.el9_5.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"product": {
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"product_id": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-unversioned-command@3.9.19-8.el9_5.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.19-8.el9_5.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src"
},
"product_reference": "python3.9-0:3.9.19-8.el9_5.1.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.19-8.el9_5.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src"
},
"product_reference": "python3.9-0:3.9.19-8.el9_5.1.src",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "BaseOS-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-test-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.19-8.el9_5.1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src"
},
"product_reference": "python3.9-0:3.9.19-8.el9_5.1.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-12T10:30:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9468"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"AppStream-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"BaseOS-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python-unversioned-command-0:3.9.19-8.el9_5.1.noarch",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-debug-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-devel-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-idle-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-libs-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-test-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3-tkinter-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-0:3.9.19-8.el9_5.1.src",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debuginfo-0:3.9.19-8.el9_5.1.x86_64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.aarch64",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.i686",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.ppc64le",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.s390x",
"CRB-9.5.0.Z.MAIN:python3.9-debugsource-0:3.9.19-8.el9_5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8374
Vulnerability from csaf_redhat - Published: 2024-10-23 13:29 - Updated: 2025-11-21 19:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8374",
"url": "https://access.redhat.com/errata/RHSA-2024:8374"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8374.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2025-11-21T19:14:55+00:00",
"generator": {
"date": "2025-11-21T19:14:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8374",
"initial_release_date": "2024-10-23T13:29:59+00:00",
"revision_history": [
{
"date": "2024-10-23T13:29:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-23T13:29:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:14:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.src",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.src",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-23T13:29:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8374"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8977
Vulnerability from csaf_redhat - Published: 2024-11-07 03:26 - Updated: 2025-11-21 19:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the python39:3.9 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8977",
"url": "https://access.redhat.com/errata/RHSA-2024:8977"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8977.json"
}
],
"title": "Red Hat Security Advisory: python39:3.9 security update",
"tracking": {
"current_release_date": "2025-11-21T19:15:51+00:00",
"generator": {
"date": "2025-11-21T19:15:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8977",
"initial_release_date": "2024-11-07T03:26:46+00:00",
"revision_history": [
{
"date": "2024-11-07T03:26:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-07T03:26:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:15:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"product": {
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src (python39:3.9)",
"product_id": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"product": {
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9)",
"product_id": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"product": {
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9)",
"product_id": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wheel@0.35.1-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=src\u0026epoch=1\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"product": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src (python39:3.9)",
"product_id": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"product": {
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9)",
"product_id": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pip@20.2.4-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"product": {
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src (python39:3.9)",
"product_id": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-setuptools@50.3.2-3.module%2Bel8.4.0%2B22168%2B8a561f05.2?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9)",
"product_id": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9)",
"product_id": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9)",
"product_id": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9)",
"product_id": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9)",
"product_id": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product": {
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9)",
"product_id": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-doc@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product": {
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9)",
"product_id": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip@20.2.4-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product": {
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9)",
"product_id": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip-wheel@20.2.4-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"product": {
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch (python39:3.9)",
"product_id": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-rpm-macros@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"product": {
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch (python39:3.9)",
"product_id": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools@50.3.2-3.module%2Bel8.4.0%2B22168%2B8a561f05.2?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"product": {
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch (python39:3.9)",
"product_id": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools-wheel@50.3.2-3.module%2Bel8.4.0%2B22168%2B8a561f05.2?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.25.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product": {
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9)",
"product_id": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel@0.35.1-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch\u0026epoch=1\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product": {
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9)",
"product_id": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel-wheel@0.35.1-3.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=noarch\u0026epoch=1\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9)",
"product_id": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9)",
"product_id": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9)",
"product_id": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9)",
"product_id": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.2-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-2.module%2Bel8.4.0%2B15042%2Bdc5a279b.1?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.4.0%2B10484%2B27ce8e03?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9)",
"product_id": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.2-2.module%2Bel8.4.0%2B22379%2Bdcc60181.4?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8040020241017072554:63cd9eba"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9"
},
"product_reference": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9"
},
"product_reference": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9"
},
"product_reference": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9"
},
"product_reference": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9"
},
"product_reference": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9"
},
"product_reference": "python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9"
},
"product_reference": "python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9"
},
"product_reference": "python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-07T03:26:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8977"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.4.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:numpy-debugsource-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-lxml-debugsource-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-debuginfo-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-debugsource-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-devel-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-idle-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-libs-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-lxml-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-lxml-debuginfo-0:4.6.2-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-doc-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-numpy-f2py-0:1.19.4-2.module+el8.4.0+15042+dc5a279b.1.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pip-wheel-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.4.0+10484+27ce8e03.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-rpm-macros-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-test-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-tkinter-0:3.9.2-2.module+el8.4.0+22379+dcc60181.4.x86_64::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-urllib3-0:1.25.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python39-wheel-wheel-1:0.35.1-3.module+el8.4.0+15042+dc5a279b.1.noarch::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-pip-0:20.2.4-3.module+el8.4.0+15042+dc5a279b.1.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-setuptools-0:50.3.2-3.module+el8.4.0+22168+8a561f05.2.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.4.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_8359
Vulnerability from csaf_redhat - Published: 2024-10-23 10:28 - Updated: 2024-11-13 16:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the python39:3.9 and python39-devel:3.9 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8359",
"url": "https://access.redhat.com/errata/RHSA-2024:8359"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8359.json"
}
],
"title": "Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update",
"tracking": {
"current_release_date": "2024-11-13T16:34:31+00:00",
"generator": {
"date": "2024-11-13T16:34:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8359",
"initial_release_date": "2024-10-23T10:28:19+00:00",
"revision_history": [
{
"date": "2024-10-23T10:28:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-23T10:28:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:34:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python39:3.9:8100020240927003152:d47b87a4",
"product": {
"name": "python39:3.9:8100020240927003152:d47b87a4",
"product_id": "python39:3.9:8100020240927003152:d47b87a4",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/python39@3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-PyMySQL@0.10.1-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-chardet@3.0.4-19.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch",
"product": {
"name": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch",
"product_id": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idna@2.10-4.module%2Bel8.10.0%2B21815%2Bbb024982?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-doc@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"product": {
"name": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"product_id": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip@20.2.4-9.module%2Bel8.10.0%2B21329%2B8d76b841?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"product": {
"name": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"product_id": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip-wheel@20.2.4-9.module%2Bel8.10.0%2B21329%2B8d76b841?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-ply@3.11-10.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pycparser@2.20-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pysocks@1.7.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-requests@2.25.0-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch",
"product": {
"name": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch",
"product_id": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-rpm-macros@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"product": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"product_id": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools@50.3.2-6.module%2Bel8.10.0%2B22183%2Bc898c0c1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"product": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"product_id": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools-wheel@50.3.2-6.module%2Bel8.10.0%2B22183%2Bc898c0c1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-six@1.15.0-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-toml@0.10.1-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch",
"product": {
"name": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch",
"product_id": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.25.10-5.module%2Bel8.10.0%2B20443%2Bf0a692fe?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel@0.35.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel-wheel@0.35.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-devel:3.9:8100020240927003152:d47b87a4",
"product": {
"name": "python39-devel:3.9:8100020240927003152:d47b87a4",
"product_id": "python39-devel:3.9:8100020240927003152:d47b87a4",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/python39-devel@3.9:8100020240927003152:d47b87a4"
}
}
},
{
"category": "product_version",
"name": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-attrs@20.3.0-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-iniconfig@1.1.1-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-more-itertools@8.5.0-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-packaging@20.4-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pluggy@0.13.1-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-py@1.10.0-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyparsing@2.4.7-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pytest@6.0.2-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch",
"product": {
"name": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch",
"product_id": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wcwidth@0.2.5-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src",
"product_id": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src",
"product_id": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src",
"product_id": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-PyMySQL@0.10.1-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-chardet@3.0.4-19.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src",
"product": {
"name": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src",
"product_id": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src",
"product": {
"name": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src",
"product_id": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-idna@2.10-4.module%2Bel8.10.0%2B21815%2Bbb024982?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ply@3.11-10.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src",
"product": {
"name": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src",
"product_id": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pycparser@2.20-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pysocks@1.7.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.0-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-toml@0.10.1-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src",
"product": {
"name": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src",
"product_id": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-5.module%2Bel8.10.0%2B20443%2Bf0a692fe?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wheel@0.35.1-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src",
"product": {
"name": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src",
"product_id": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pip@20.2.4-9.module%2Bel8.10.0%2B21329%2B8d76b841?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src",
"product": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src",
"product_id": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-setuptools@50.3.2-6.module%2Bel8.10.0%2B22183%2Bc898c0c1?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src",
"product_id": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-six@1.15.0-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src",
"product_id": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src",
"product_id": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src",
"product_id": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src",
"product_id": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pytest@6.0.2-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-attrs@20.3.0-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-iniconfig@1.1.1-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-more-itertools@8.5.0-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-packaging@20.4-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pluggy@0.13.1-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-py@1.10.0-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src",
"product_id": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wcwidth@0.2.5-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src",
"product": {
"name": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src",
"product_id": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pyparsing@2.4.7-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product_id": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_id": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product_id": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_id": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_id": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_id": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython-debugsource@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython-debuginfo@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_id": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debug@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_id": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11-devel@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product_id": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_id": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product_id": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_id": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_id": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_id": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython-debugsource@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython-debuginfo@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_id": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debug@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_id": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11-devel@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product_id": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_id": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product_id": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_id": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_id": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_id": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython-debugsource@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython-debuginfo@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_id": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debug@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_id": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11-devel@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product_id": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_id": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product_id": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-3.module%2Bel8.10.0%2B21271%2Beccd1d86?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-7.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_id": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_id": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_id": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-3.module%2Bel8.10.0%2B21142%2B453d2b75?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/Cython-debugsource@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-Cython-debuginfo@0.29.21-5.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_id": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debug@3.9.20-1.module%2Bel8.10.0%2B22342%2B478c159e?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_id": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pybind11-devel@2.7.1-1.module%2Bel8.9.0%2B19644%2Bd68f775d?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
"product_reference": "python39:3.9:8100020240927003152:d47b87a4",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src"
},
"product_reference": "python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src"
},
"product_reference": "python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src"
},
"product_reference": "python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src"
},
"product_reference": "python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64"
},
"product_reference": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le"
},
"product_reference": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x"
},
"product_reference": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64"
},
"product_reference": "python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch"
},
"product_reference": "python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch"
},
"product_reference": "python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch"
},
"product_reference": "python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64"
},
"product_reference": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le"
},
"product_reference": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x"
},
"product_reference": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64"
},
"product_reference": "python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch"
},
"product_reference": "python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch"
},
"product_reference": "python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src"
},
"product_reference": "python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
"product_reference": "python39-devel:3.9:8100020240927003152:d47b87a4",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64"
},
"product_reference": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le"
},
"product_reference": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x"
},
"product_reference": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64"
},
"product_reference": "python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64"
},
"product_reference": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le"
},
"product_reference": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x"
},
"product_reference": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64 as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64"
},
"product_reference": "python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch"
},
"product_reference": "python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src as a component of python39-devel:3.9:8100020240927003152:d47b87a4 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src"
},
"product_reference": "python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-23T10:28:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8359"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-0:5.4.1-1.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:PyYAML-debugsource-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:numpy-debugsource-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cffi-debugsource-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-cryptography-debugsource-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-idna-0:2.10-4.module+el8.10.0+21815+bb024982.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-lxml-debugsource-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psutil-debugsource-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-psycopg2-debugsource-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-PyMySQL-0:0.10.1-2.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cffi-debuginfo-0:1.14.3-2.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-chardet-0:3.0.4-19.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-cryptography-debuginfo-0:3.3.1-3.module+el8.10.0+21271+eccd1d86.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debuginfo-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-debugsource-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-devel-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idle-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-idna-0:2.10-4.module+el8.10.0+21815+bb024982.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-libs-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-lxml-debuginfo-0:4.6.5-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-mod_wsgi-0:4.7.1-7.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-debuginfo-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-doc-0:1.19.4-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-numpy-f2py-0:1.19.4-3.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pip-wheel-0:20.2.4-9.module+el8.10.0+21329+8d76b841.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-ply-0:3.11-10.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psutil-debuginfo-0:5.8.0-4.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-debuginfo-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-doc-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-psycopg2-tests-0:2.8.6-3.module+el8.10.0+21142+453d2b75.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pycparser-0:2.20-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pysocks-0:1.7.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-requests-0:2.25.0-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-rpm-macros-0:3.9.20-1.module+el8.10.0+22342+478c159e.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-scipy-debuginfo-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-setuptools-wheel-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-test-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-tkinter-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-toml-0:0.10.1-5.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-urllib3-0:1.25.10-5.module+el8.10.0+20443+f0a692fe.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python39-wheel-wheel-1:0.35.1-4.module+el8.9.0+19644+d68f775d.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-pip-0:20.2.4-9.module+el8.10.0+21329+8d76b841.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-setuptools-0:50.3.2-6.module+el8.10.0+22183+c898c0c1.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:python3x-six-0:1.15.0-3.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-0:1.5.4-5.module+el8.9.0+19644+d68f775d.src",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python39:3.9:8100020240927003152:d47b87a4:scipy-debugsource-0:1.5.4-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:Cython-debugsource-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.src",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-Cython-debuginfo-0:0.29.21-5.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-attrs-0:20.3.0-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-debug-0:3.9.20-1.module+el8.10.0+22342+478c159e.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-iniconfig-0:1.1.1-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-more-itertools-0:8.5.0-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-packaging-0:20.4-4.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pluggy-0:0.13.1-3.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-py-0:1.10.0-1.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pybind11-devel-0:2.7.1-1.module+el8.9.0+19644+d68f775d.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-pytest-0:6.0.2-2.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python39-wcwidth-0:0.2.5-3.module+el8.9.0+19644+d68f775d.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python39-devel:3.9:8100020240927003152:d47b87a4:python3x-pyparsing-0:2.4.7-5.module+el8.9.0+19644+d68f775d.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_8374
Vulnerability from csaf_redhat - Published: 2024-10-23 13:29 - Updated: 2024-11-13 16:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8374",
"url": "https://access.redhat.com/errata/RHSA-2024:8374"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8374.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2024-11-13T16:34:42+00:00",
"generator": {
"date": "2024-11-13T16:34:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8374",
"initial_release_date": "2024-10-23T13:29:59+00:00",
"revision_history": [
{
"date": "2024-10-23T13:29:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-23T13:29:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:34:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.src",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.src",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.7-1.el9_4.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"product": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"product_id": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.7-1.el9_4.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-23T13:29:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8374"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debug-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-devel-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-idle-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-libs-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-test-0:3.11.7-1.el9_4.6.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.7-1.el9_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_8130
Vulnerability from csaf_redhat - Published: 2024-10-15 10:43 - Updated: 2024-11-13 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.9 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8130",
"url": "https://access.redhat.com/errata/RHSA-2024:8130"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8130.json"
}
],
"title": "Red Hat Security Advisory: python3.9 security update",
"tracking": {
"current_release_date": "2024-11-13T16:35:09+00:00",
"generator": {
"date": "2024-11-13T16:35:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8130",
"initial_release_date": "2024-10-15T10:43:46+00:00",
"revision_history": [
{
"date": "2024-10-15T10:43:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-15T10:43:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:35:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.10-4.el9_0.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.10-4.el9_0.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.10-4.el9_0.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.9-0:3.9.10-4.el9_0.6.src",
"product": {
"name": "python3.9-0:3.9.10-4.el9_0.6.src",
"product_id": "python3.9-0:3.9.10-4.el9_0.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9@3.9.10-4.el9_0.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"product": {
"name": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"product_id": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-unversioned-command@3.9.10-4.el9_0.6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.10-4.el9_0.6.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src"
},
"product_reference": "python3.9-0:3.9.10-4.el9_0.6.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.10-4.el9_0.6.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src"
},
"product_reference": "python3.9-0:3.9.10-4.el9_0.6.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-15T10:43:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8130"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:7415
Vulnerability from csaf_redhat - Published: 2024-10-01 02:34 - Updated: 2025-11-21 19:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7415",
"url": "https://access.redhat.com/errata/RHSA-2024:7415"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7415.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2025-11-21T19:13:37+00:00",
"generator": {
"date": "2025-11-21T19:13:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:7415",
"initial_release_date": "2024-10-01T02:34:25+00:00",
"revision_history": [
{
"date": "2024-10-01T02:34:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-01T02:34:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:13:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el9_2.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"product_id": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el9_2.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el9_2.6.src",
"product": {
"name": "python3.11-0:3.11.2-2.el9_2.6.src",
"product_id": "python3.11-0:3.11.2-2.el9_2.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el9_2.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-01T02:34:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7415"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-01T02:34:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7415"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"AppStream-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"AppStream-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.src",
"CRB-9.2.0.Z.EUS:python3.11-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debug-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-devel-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-idle-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-libs-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-test-0:3.11.2-2.el9_2.6.x86_64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.aarch64",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.i686",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.ppc64le",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.s390x",
"CRB-9.2.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el9_2.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
}
]
}
RHSA-2024_7647
Vulnerability from csaf_redhat - Published: 2024-10-03 18:29 - Updated: 2024-11-13 16:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7647",
"url": "https://access.redhat.com/errata/RHSA-2024:7647"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7647.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2024-11-13T16:34:10+00:00",
"generator": {
"date": "2024-11-13T16:34:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:7647",
"initial_release_date": "2024-10-03T18:29:42+00:00",
"revision_history": [
{
"date": "2024-10-03T18:29:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-03T18:29:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:34:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.src",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.src",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"product": {
"name": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"product_id": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-rpm-macros@3.11.2-2.el8_8.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch"
},
"product_reference": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.src",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch"
},
"product_reference": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-03T18:29:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7647"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:6975
Vulnerability from csaf_redhat - Published: 2024-09-24 03:08 - Updated: 2025-11-21 19:12Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032)\n\n* cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6975",
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2292921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292921"
},
{
"category": "external",
"summary": "2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "RHEL-48605",
"url": "https://issues.redhat.com/browse/RHEL-48605"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6975.json"
}
],
"title": "Red Hat Security Advisory: python3 security update",
"tracking": {
"current_release_date": "2025-11-21T19:12:43+00:00",
"generator": {
"date": "2025-11-21T19:12:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:6975",
"initial_release_date": "2024-09-24T03:08:07+00:00",
"revision_history": [
{
"date": "2024-09-24T03:08:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-24T03:08:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:12:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.i686",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.i686",
"product_id": "platform-python-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.i686",
"product_id": "python3-idle-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.i686",
"product_id": "python3-test-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.i686",
"product_id": "python3-libs-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.x86_64",
"product_id": "platform-python-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-test-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.aarch64",
"product_id": "platform-python-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-test-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"product_id": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-idle-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.s390x",
"product_id": "platform-python-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-libs-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-test-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-67.el8_10.src",
"product": {
"name": "python3-0:3.6.8-67.el8_10.src",
"product_id": "python3-0:3.6.8-67.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-67.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-67.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src"
},
"product_reference": "python3-0:3.6.8-67.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-67.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src"
},
"product_reference": "python3-0:3.6.8-67.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2024-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2292921"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Python. The ipaddress module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \u201cglobally reachable\u201d or \u201cprivate\u201d. Due to this issue, it is possible that values will not be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: incorrect IPv4 and IPv6 private ranges",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4032"
},
{
"category": "external",
"summary": "RHBZ#2292921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4032",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4032"
}
],
"release_date": "2024-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T03:08:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: incorrect IPv4 and IPv6 private ranges"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T03:08:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T03:08:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
}
]
}
RHSA-2024_6909
Vulnerability from csaf_redhat - Published: 2024-09-23 02:01 - Updated: 2024-12-18 03:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.9 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6909",
"url": "https://access.redhat.com/errata/RHSA-2024:6909"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6909.json"
}
],
"title": "Red Hat Security Advisory: python3.9 security update",
"tracking": {
"current_release_date": "2024-12-18T03:38:58+00:00",
"generator": {
"date": "2024-12-18T03:38:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:6909",
"initial_release_date": "2024-09-23T02:01:43+00:00",
"revision_history": [
{
"date": "2024-09-23T02:01:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-23T02:01:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T03:38:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.16-1.el9_2.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"product": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"product_id": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.16-1.el9_2.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"product": {
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"product_id": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-unversioned-command@3.9.16-1.el9_2.8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.9-0:3.9.16-1.el9_2.8.src",
"product": {
"name": "python3.9-0:3.9.16-1.el9_2.8.src",
"product_id": "python3.9-0:3.9.16-1.el9_2.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9@3.9.16-1.el9_2.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.16-1.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src"
},
"product_reference": "python3.9-0:3.9.16-1.el9_2.8.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.16-1.el9_2.8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src"
},
"product_reference": "python3.9-0:3.9.16-1.el9_2.8.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-test-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.16-1.el9_2.8.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src"
},
"product_reference": "python3.9-0:3.9.16-1.el9_2.8.src",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.2)",
"product_id": "CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"relates_to_product_reference": "CRB-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-23T02:01:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6909"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-23T02:01:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6909"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"AppStream-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"BaseOS-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python-unversioned-command-0:3.9.16-1.el9_2.8.noarch",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-debug-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-devel-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-idle-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-libs-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-test-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3-tkinter-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-0:3.9.16-1.el9_2.8.src",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debuginfo-0:3.9.16-1.el9_2.8.x86_64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.aarch64",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.i686",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.ppc64le",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.s390x",
"CRB-9.2.0.Z.EUS:python3.9-debugsource-0:3.9.16-1.el9_2.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
}
]
}
RHSA-2024_8836
Vulnerability from csaf_redhat - Published: 2024-11-05 04:12 - Updated: 2024-11-13 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.12 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the \"python3.12\" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the \"python3.12-\" prefix. For the unversioned \"python\" executable, see manual page \"unversioned-python\".\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8836",
"url": "https://access.redhat.com/errata/RHSA-2024:8836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8836.json"
}
],
"title": "Red Hat Security Advisory: python3.12 security update",
"tracking": {
"current_release_date": "2024-11-13T16:35:59+00:00",
"generator": {
"date": "2024-11-13T16:35:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8836",
"initial_release_date": "2024-11-05T04:12:36+00:00",
"revision_history": [
{
"date": "2024-11-05T04:12:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-05T04:12:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:35:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.src",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.src",
"product_id": "python3.12-0:3.12.6-1.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"product": {
"name": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"product_id": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-rpm-macros@3.12.6-1.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch"
},
"product_reference": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch"
},
"product_reference": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-05T04:12:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8836"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8836
Vulnerability from csaf_redhat - Published: 2024-11-05 04:12 - Updated: 2025-11-21 19:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.12 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the \"python3.12\" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the \"python3.12-\" prefix. For the unversioned \"python\" executable, see manual page \"unversioned-python\".\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8836",
"url": "https://access.redhat.com/errata/RHSA-2024:8836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8836.json"
}
],
"title": "Red Hat Security Advisory: python3.12 security update",
"tracking": {
"current_release_date": "2025-11-21T19:15:34+00:00",
"generator": {
"date": "2025-11-21T19:15:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8836",
"initial_release_date": "2024-11-05T04:12:36+00:00",
"revision_history": [
{
"date": "2024-11-05T04:12:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-05T04:12:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:15:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.src",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.src",
"product_id": "python3.12-0:3.12.6-1.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.6-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"product": {
"name": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"product_id": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.6-1.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"product": {
"name": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"product_id": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-rpm-macros@3.12.6-1.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch"
},
"product_reference": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch"
},
"product_reference": "python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-test-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-05T04:12:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8836"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debug-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-devel-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-idle-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-libs-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-rpm-macros-0:3.12.6-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-test-0:3.12.6-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.6-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:7647
Vulnerability from csaf_redhat - Published: 2024-10-03 18:29 - Updated: 2025-11-21 19:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:7647",
"url": "https://access.redhat.com/errata/RHSA-2024:7647"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7647.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2025-11-21T19:13:55+00:00",
"generator": {
"date": "2025-11-21T19:13:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:7647",
"initial_release_date": "2024-10-03T18:29:42+00:00",
"revision_history": [
{
"date": "2024-10-03T18:29:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-03T18:29:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:13:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.src",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.src",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.2-2.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"product": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"product_id": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.2-2.el8_8.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"product": {
"name": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"product_id": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-rpm-macros@3.11.2-2.el8_8.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch"
},
"product_reference": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.src as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.src",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch"
},
"product_reference": "python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.8.8)",
"product_id": "CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"relates_to_product_reference": "CRB-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-03T18:29:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:7647"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"AppStream-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"AppStream-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.src",
"CRB-8.8.0.Z.EUS:python3.11-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debug-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debuginfo-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-debugsource-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-devel-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-idle-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-libs-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-rpm-macros-0:3.11.2-2.el8_8.4.noarch",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-test-0:3.11.2-2.el8_8.4.x86_64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.aarch64",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.i686",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.ppc64le",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.s390x",
"CRB-8.8.0.Z.EUS:python3.11-tkinter-0:3.11.2-2.el8_8.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8447
Vulnerability from csaf_redhat - Published: 2024-10-24 12:09 - Updated: 2025-11-21 19:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.12 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python 3.12 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.12 package provides the \"python3.12\" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.12-libs package, which should be installed automatically along with python3.12. The remaining parts of the Python standard library are broken out into the python3.12-tkinter and python3.12-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.12-docs package. Packages containing additional libraries for Python are generally named with the \"python3.12-\" prefix.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8447",
"url": "https://access.redhat.com/errata/RHSA-2024:8447"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8447.json"
}
],
"title": "Red Hat Security Advisory: python3.12 security update",
"tracking": {
"current_release_date": "2025-11-21T19:14:59+00:00",
"generator": {
"date": "2025-11-21T19:14:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8447",
"initial_release_date": "2024-10-24T12:09:14+00:00",
"revision_history": [
{
"date": "2024-10-24T12:09:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-24T12:09:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:14:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.src",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.src",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-devel@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-libs@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-tkinter@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debugsource@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debuginfo@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-debug@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-idle@3.12.1-4.el9_4.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"product": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"product_id": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.12-test@3.12.1-4.el9_4.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.src",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
},
"product_reference": "python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-24T12:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8447"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.src",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debug-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debuginfo-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-debugsource-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-devel-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-idle-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-libs-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-test-0:3.12.1-4.el9_4.4.x86_64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.aarch64",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.i686",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.ppc64le",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.s390x",
"CRB-9.4.0.Z.MAIN.EUS:python3.12-tkinter-0:3.12.1-4.el9_4.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_8838
Vulnerability from csaf_redhat - Published: 2024-11-05 02:55 - Updated: 2024-11-13 16:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8838",
"url": "https://access.redhat.com/errata/RHSA-2024:8838"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8838.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2024-11-13T16:36:09+00:00",
"generator": {
"date": "2024-11-13T16:36:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8838",
"initial_release_date": "2024-11-05T02:55:30+00:00",
"revision_history": [
{
"date": "2024-11-05T02:55:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-05T02:55:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:36:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.src",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.src",
"product_id": "python3.11-0:3.11.10-1.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"product": {
"name": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"product_id": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-rpm-macros@3.11.10-1.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch"
},
"product_reference": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch"
},
"product_reference": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-05T02:55:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8838"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024_6975
Vulnerability from csaf_redhat - Published: 2024-09-24 03:08 - Updated: 2024-12-18 03:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032)\n\n* cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:6975",
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2292921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292921"
},
{
"category": "external",
"summary": "2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "RHEL-48605",
"url": "https://issues.redhat.com/browse/RHEL-48605"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_6975.json"
}
],
"title": "Red Hat Security Advisory: python3 security update",
"tracking": {
"current_release_date": "2024-12-18T03:39:47+00:00",
"generator": {
"date": "2024-12-18T03:39:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:6975",
"initial_release_date": "2024-09-24T03:08:07+00:00",
"revision_history": [
{
"date": "2024-09-24T03:08:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-09-24T03:08:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T03:39:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.i686",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.i686",
"product_id": "platform-python-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.i686",
"product_id": "python3-idle-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.i686",
"product_id": "python3-test-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.i686",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.i686",
"product_id": "python3-libs-0:3.6.8-67.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.x86_64",
"product_id": "platform-python-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.x86_64",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.x86_64",
"product_id": "python3-test-0:3.6.8-67.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.aarch64",
"product_id": "platform-python-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.aarch64",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.aarch64",
"product_id": "python3-test-0:3.6.8-67.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"product_id": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"product_id": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"product_id": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-debug@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"product_id": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python-devel@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-idle-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-idle-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debugsource@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "platform-python-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "platform-python-0:3.6.8-67.el8_10.s390x",
"product_id": "platform-python-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/platform-python@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-libs-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-libs-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-67.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-67.el8_10.s390x",
"product": {
"name": "python3-test-0:3.6.8-67.el8_10.s390x",
"product_id": "python3-test-0:3.6.8-67.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-67.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-67.el8_10.src",
"product": {
"name": "python3-0:3.6.8-67.el8_10.src",
"product_id": "python3-0:3.6.8-67.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-67.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-67.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src"
},
"product_reference": "python3-0:3.6.8-67.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-debug-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "platform-python-devel-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-67.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src"
},
"product_reference": "python3-0:3.6.8-67.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debugsource-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-test-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-67.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2024-06-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2292921"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Python. The ipaddress module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \u201cglobally reachable\u201d or \u201cprivate\u201d. Due to this issue, it is possible that values will not be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: incorrect IPv4 and IPv6 private ranges",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4032"
},
{
"category": "external",
"summary": "RHBZ#2292921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4032",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4032"
}
],
"release_date": "2024-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T03:08:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "python: incorrect IPv4 and IPv6 private ranges"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T03:08:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
},
{
"cve": "CVE-2024-6923",
"discovery_date": "2024-08-01T14:30:06+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302255"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the email module that uses Python language. The email module doesn\u0027t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "RHBZ#2302255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302255"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121650",
"url": "https://github.com/python/cpython/issues/121650"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/122233",
"url": "https://github.com/python/cpython/pull/122233"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-24T03:08:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-debug-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:platform-python-devel-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-0:3.6.8-67.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debuginfo-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-debugsource-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-idle-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libs-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-test-0:3.6.8-67.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-tkinter-0:3.6.8-67.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: email module doesn\u0027t properly quotes newlines in email headers, allowing header injection"
}
]
}
RHSA-2024_8797
Vulnerability from csaf_redhat - Published: 2024-11-04 06:00 - Updated: 2024-11-13 16:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the python39:3.9 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8797",
"url": "https://access.redhat.com/errata/RHSA-2024:8797"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8797.json"
}
],
"title": "Red Hat Security Advisory: python39:3.9 security update",
"tracking": {
"current_release_date": "2024-11-13T16:35:47+00:00",
"generator": {
"date": "2024-11-13T16:35:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2024:8797",
"initial_release_date": "2024-11-04T06:00:43+00:00",
"revision_history": [
{
"date": "2024-11-04T06:00:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T06:00:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T16:35:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python39:3.9:8060020241017081122:6a631399",
"product": {
"name": "python39:3.9:8060020241017081122:6a631399",
"product_id": "python39:3.9:8060020241017081122:6a631399",
"product_identification_helper": {
"purl": "pkg:rpmmod/redhat/python39@3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"product": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"product_id": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-doc@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product_id": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product_id": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip-wheel@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"product": {
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"product_id": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-rpm-macros@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"product": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"product_id": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools@50.3.2-6.module%2Bel8.6.0%2B22162%2B859a69ec?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"product": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"product_id": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools-wheel@50.3.2-6.module%2Bel8.6.0%2B22162%2B859a69ec?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product_id": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"product": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"product_id": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.25.10-4.module%2Bel8.5.0%2B11712%2Bea2d2be1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product_id": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product_id": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"product": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"product_id": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=src"
}
}
},
{
"category": "product_version",
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_id": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"product": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"product_id": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"product": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"product_id": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product_id": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"product": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"product_id": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-4.module%2Bel8.5.0%2B11712%2Bea2d2be1?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"product": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"product_id": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"product": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"product_id": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pip@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"product": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"product_id": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-setuptools@50.3.2-6.module%2Bel8.6.0%2B22162%2B859a69ec?arch=src"
}
}
},
{
"category": "product_version",
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
},
{
"category": "product_version",
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product_id": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_id": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_id": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_id": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_id": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_id": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_id": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_id": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_id": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_id": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_id": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_id": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_id": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_id": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_id": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_id": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_id": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_id": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_id": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_id": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_id": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_id": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_id": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_id": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_id": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_id": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_id": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_id": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_id": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
"product_reference": "python39:3.9:8060020241017081122:6a631399",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src"
},
"product_reference": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch"
},
"product_reference": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch"
},
"product_reference": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch"
},
"product_reference": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch"
},
"product_reference": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src"
},
"product_reference": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
"product_reference": "python39:3.9:8060020241017081122:6a631399",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src"
},
"product_reference": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch"
},
"product_reference": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch"
},
"product_reference": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch"
},
"product_reference": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch"
},
"product_reference": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src"
},
"product_reference": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
"product_reference": "python39:3.9:8060020241017081122:6a631399",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src"
},
"product_reference": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch"
},
"product_reference": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch"
},
"product_reference": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch"
},
"product_reference": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch"
},
"product_reference": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src"
},
"product_reference": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 as a component of python39:3.9:8060020241017081122:6a631399 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T06:00:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8797"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.AUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x",
"AppStream-8.6.0.Z.E4S:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src",
"AppStream-8.6.0.Z.TUS:python39:3.9:8060020241017081122:6a631399:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8797
Vulnerability from csaf_redhat - Published: 2024-11-04 06:00 - Updated: 2025-11-21 19:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the python39:3.9 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8797",
"url": "https://access.redhat.com/errata/RHSA-2024:8797"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8797.json"
}
],
"title": "Red Hat Security Advisory: python39:3.9 security update",
"tracking": {
"current_release_date": "2025-11-21T19:15:29+00:00",
"generator": {
"date": "2025-11-21T19:15:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8797",
"initial_release_date": "2024-11-04T06:00:43+00:00",
"revision_history": [
{
"date": "2024-11-04T06:00:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-04T06:00:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:15:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"product": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src (python39:3.9)",
"product_id": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"product": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src (python39:3.9)",
"product_id": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"product": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src (python39:3.9)",
"product_id": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"product": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src (python39:3.9)",
"product_id": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-4.module%2Bel8.5.0%2B11712%2Bea2d2be1?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"product": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src (python39:3.9)",
"product_id": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=src\u0026epoch=1\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src (python39:3.9)",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"product": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src (python39:3.9)",
"product_id": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-pip@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"product": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src (python39:3.9)",
"product_id": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-setuptools@50.3.2-6.module%2Bel8.6.0%2B22162%2B859a69ec?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3x-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9)",
"product_id": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=src\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9)",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9)",
"product_id": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9)",
"product_id": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9)",
"product_id": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9)",
"product_id": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=x86_64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-PyMySQL@0.10.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-chardet@3.0.4-19.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idna@2.10-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch (python39:3.9)",
"product_id": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-doc@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"product": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9)",
"product_id": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"product": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9)",
"product_id": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pip-wheel@20.2.4-7.module%2Bel8.6.0%2B13003%2B6bb2c488?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-ply@3.11-10.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pycparser@2.20-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pysocks@1.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-requests@2.25.0-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"product": {
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch (python39:3.9)",
"product_id": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-rpm-macros@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"product": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch (python39:3.9)",
"product_id": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools@50.3.2-6.module%2Bel8.6.0%2B22162%2B859a69ec?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"product": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch (python39:3.9)",
"product_id": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-setuptools-wheel@50.3.2-6.module%2Bel8.6.0%2B22162%2B859a69ec?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-six@1.15.0-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9)",
"product_id": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-toml@0.10.1-5.module%2Bel8.4.0%2B9822%2B20bf1249?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"product": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch (python39:3.9)",
"product_id": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.25.10-4.module%2Bel8.5.0%2B11712%2Bea2d2be1?arch=noarch\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9)",
"product_id": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026epoch=1\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9)",
"product_id": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-wheel-wheel@0.35.1-4.module%2Bel8.5.0%2B12204%2B54860423?arch=noarch\u0026epoch=1\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9)",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9)",
"product_id": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9)",
"product_id": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9)",
"product_id": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9)",
"product_id": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=aarch64\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9)",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9)",
"product_id": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9)",
"product_id": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9)",
"product_id": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9)",
"product_id": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=ppc64le\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9)",
"product_id": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/PyYAML-debugsource@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9)",
"product_id": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/numpy-debugsource@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cffi-debugsource@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-cryptography-debugsource@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9)",
"product_id": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-lxml-debugsource@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psutil-debugsource@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-psycopg2-debugsource@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9)",
"product_id": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cffi-debuginfo@1.14.3-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-cryptography-debuginfo@3.3.1-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9)",
"product_id": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debuginfo@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9)",
"product_id": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-debugsource@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9)",
"product_id": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-devel@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9)",
"product_id": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-idle@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9)",
"product_id": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-libs@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9)",
"product_id": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9)",
"product_id": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-lxml-debuginfo@4.6.5-1.module%2Bel8.6.0%2B13933%2B9cf0c87c?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-mod_wsgi@4.7.1-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9)",
"product_id": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9)",
"product_id": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-debuginfo@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9)",
"product_id": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-numpy-f2py@1.19.4-3.module%2Bel8.5.0%2B12204%2B54860423?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psutil-debuginfo@5.8.0-4.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-debuginfo@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-doc@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-psycopg2-tests@2.8.6-2.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9)",
"product_id": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9)",
"product_id": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pyyaml-debuginfo@5.4.1-1.module%2Bel8.5.0%2B10613%2B59a13ec4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-scipy-debuginfo@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9)",
"product_id": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-test@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9)",
"product_id": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-tkinter@3.9.7-2.module%2Bel8.6.0%2B22380%2Ba90b5d28.4?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
},
{
"category": "product_version",
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9)",
"product_id": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scipy-debugsource@1.5.4-3.module%2Bel8.4.0%2B9822%2B20bf1249?arch=s390x\u0026rpmmod=python39:3.9:8060020241017081122:6a631399"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9"
},
"product_reference": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9"
},
"product_reference": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9"
},
"product_reference": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9"
},
"product_reference": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9"
},
"product_reference": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9"
},
"product_reference": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9"
},
"product_reference": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9"
},
"product_reference": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9"
},
"product_reference": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9"
},
"product_reference": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9"
},
"product_reference": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9"
},
"product_reference": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9"
},
"product_reference": "PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9"
},
"product_reference": "numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9"
},
"product_reference": "python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9"
},
"product_reference": "python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9"
},
"product_reference": "python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9"
},
"product_reference": "python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9"
},
"product_reference": "python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9"
},
"product_reference": "python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9"
},
"product_reference": "python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9"
},
"product_reference": "python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9"
},
"product_reference": "python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9"
},
"product_reference": "python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9"
},
"product_reference": "python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9"
},
"product_reference": "python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9"
},
"product_reference": "python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9"
},
"product_reference": "python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9"
},
"product_reference": "python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9"
},
"product_reference": "python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9"
},
"product_reference": "scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64 (python39:3.9) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
},
"product_reference": "scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-04T06:00:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8797"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.AUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.aarch64::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.ppc64le::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.s390x::python39:3.9",
"AppStream-8.6.0.Z.E4S:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:PyYAML-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:PyYAML-debugsource-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:numpy-debugsource-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cffi-debugsource-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-cryptography-debugsource-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-lxml-debugsource-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psutil-debugsource-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-psycopg2-debugsource-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-PyMySQL-0:0.10.1-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cffi-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cffi-debuginfo-0:1.14.3-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-chardet-0:3.0.4-19.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cryptography-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-cryptography-debuginfo-0:3.3.1-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-debuginfo-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-debugsource-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-devel-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-idle-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-idna-0:2.10-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-libs-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-lxml-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-lxml-debuginfo-0:4.6.5-1.module+el8.6.0+13933+9cf0c87c.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-mod_wsgi-0:4.7.1-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-debuginfo-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-doc-0:1.19.4-3.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-numpy-f2py-0:1.19.4-3.module+el8.5.0+12204+54860423.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pip-wheel-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-ply-0:3.11-10.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psutil-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psutil-debuginfo-0:5.8.0-4.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-debuginfo-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-doc-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-psycopg2-tests-0:2.8.6-2.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pycparser-0:2.20-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pysocks-0:1.7.1-4.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pyyaml-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-pyyaml-debuginfo-0:5.4.1-1.module+el8.5.0+10613+59a13ec4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-requests-0:2.25.0-2.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-rpm-macros-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-scipy-debuginfo-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-setuptools-wheel-0:50.3.2-6.module+el8.6.0+22162+859a69ec.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-test-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-tkinter-0:3.9.7-2.module+el8.6.0+22380+a90b5d28.4.x86_64::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-toml-0:0.10.1-5.module+el8.4.0+9822+20bf1249.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-urllib3-0:1.25.10-4.module+el8.5.0+11712+ea2d2be1.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python39-wheel-wheel-1:0.35.1-4.module+el8.5.0+12204+54860423.noarch::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-pip-0:20.2.4-7.module+el8.6.0+13003+6bb2c488.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-setuptools-0:50.3.2-6.module+el8.6.0+22162+859a69ec.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:python3x-six-0:1.15.0-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:scipy-0:1.5.4-3.module+el8.4.0+9822+20bf1249.src::python39:3.9",
"AppStream-8.6.0.Z.TUS:scipy-debugsource-0:1.5.4-3.module+el8.4.0+9822+20bf1249.x86_64::python39:3.9"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8490
Vulnerability from csaf_redhat - Published: 2024-10-28 00:29 - Updated: 2025-11-21 19:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3 is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8490",
"url": "https://access.redhat.com/errata/RHSA-2024:8490"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8490.json"
}
],
"title": "Red Hat Security Advisory: python3 security update",
"tracking": {
"current_release_date": "2025-11-21T19:15:01+00:00",
"generator": {
"date": "2025-11-21T19:15:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8490",
"initial_release_date": "2024-10-28T00:29:23+00:00",
"revision_history": [
{
"date": "2024-10-28T00:29:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-28T00:29:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:15:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-10.el7_7.1.src",
"product": {
"name": "python3-0:3.6.8-10.el7_7.1.src",
"product_id": "python3-0:3.6.8-10.el7_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-10.el7_7.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-10.el7_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"product": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"product_id": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-10.el7_7.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debuginfo@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-debug@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-idle@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-test-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-test-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-test-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-test@3.6.8-10.el7_7.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"product": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"product_id": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.6.8-10.el7_7.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-test-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-debug-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debug-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-devel-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-idle-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-libs-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-test-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-test-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-test-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686"
},
"product_reference": "python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
},
"product_reference": "python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:29:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8490"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.src",
"7Server-optional-7.7.AUS:python3-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debug-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-debuginfo-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-devel-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-idle-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-libs-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-test-0:3.6.8-10.el7_7.1.x86_64",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.i686",
"7Server-optional-7.7.AUS:python3-tkinter-0:3.6.8-10.el7_7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8838
Vulnerability from csaf_redhat - Published: 2024-11-05 02:55 - Updated: 2025-11-21 19:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8838",
"url": "https://access.redhat.com/errata/RHSA-2024:8838"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8838.json"
}
],
"title": "Red Hat Security Advisory: python3.11 security update",
"tracking": {
"current_release_date": "2025-11-21T19:15:35+00:00",
"generator": {
"date": "2025-11-21T19:15:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8838",
"initial_release_date": "2024-11-05T02:55:30+00:00",
"revision_history": [
{
"date": "2024-11-05T02:55:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-05T02:55:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:15:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.src",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.src",
"product_id": "python3.11-0:3.11.10-1.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-devel@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-libs@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-tkinter@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debugsource@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debuginfo@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-debug@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-idle@3.11.10-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"product": {
"name": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"product_id": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-test@3.11.10-1.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"product": {
"name": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"product_id": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-rpm-macros@3.11.10-1.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch"
},
"product_reference": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debug-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-devel-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-idle-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-libs-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch"
},
"product_reference": "python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-test-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-test-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
},
"product_reference": "python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-05T02:55:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8838"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debug-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debuginfo-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-debugsource-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-devel-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-idle-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-libs-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-rpm-macros-0:3.11.10-1.el8_10.noarch",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-test-0:3.11.10-1.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:python3.11-tkinter-0:3.11.10-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
RHSA-2024:8130
Vulnerability from csaf_redhat - Published: 2024-10-15 10:43 - Updated: 2025-11-21 19:14Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.9 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8130",
"url": "https://access.redhat.com/errata/RHSA-2024:8130"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8130.json"
}
],
"title": "Red Hat Security Advisory: python3.9 security update",
"tracking": {
"current_release_date": "2025-11-21T19:14:39+00:00",
"generator": {
"date": "2025-11-21T19:14:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:8130",
"initial_release_date": "2024-10-15T10:43:46+00:00",
"revision_history": [
{
"date": "2024-10-15T10:43:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-15T10:43:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:14:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"product": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"product_id": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.10-4.el9_0.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"product": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"product_id": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.10-4.el9_0.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"product": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"product_id": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.10-4.el9_0.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libs@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debugsource@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9-debuginfo@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-devel@3.9.10-4.el9_0.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"product": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"product_id": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-tkinter@3.9.10-4.el9_0.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.9-0:3.9.10-4.el9_0.6.src",
"product": {
"name": "python3.9-0:3.9.10-4.el9_0.6.src",
"product_id": "python3.9-0:3.9.10-4.el9_0.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.9@3.9.10-4.el9_0.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"product": {
"name": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"product_id": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-unversioned-command@3.9.10-4.el9_0.6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.10-4.el9_0.6.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src"
},
"product_reference": "python3.9-0:3.9.10-4.el9_0.6.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch"
},
"product_reference": "python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libs-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-0:3.9.10-4.el9_0.6.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src"
},
"product_reference": "python3.9-0:3.9.10-4.el9_0.6.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
},
"product_reference": "python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2024-09-03T13:20:06.850070+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2309426"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDos) vulnerability was found in Python\u0027s tarfile module. Due to excessive backtracking while tarfile parses headers, an attacker may be able to trigger a denial of service via a specially crafted tar archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is classified as moderate severity rather than important because while it does allow for a denial of service (DoS) attack via excessive backtracking in the tarfile module, it does not enable remote code execution or compromise the integrity or confidentiality of data. Exploitation requires an attacker to provide a specially crafted tar archive and relies on the victim\u0027s system processing that file, which limits the attack vector.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "RHBZ#2309426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/121285",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/121286",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
],
"release_date": "2024-09-03T13:15:05.363000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-15T10:43:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8130"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"AppStream-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python-unversioned-command-0:3.9.10-4.el9_0.6.noarch",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-devel-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libs-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3-tkinter-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-0:3.9.10-4.el9_0.6.src",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debuginfo-0:3.9.10-4.el9_0.6.x86_64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.aarch64",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.i686",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.s390x",
"BaseOS-9.0.0.Z.E4S:python3.9-debugsource-0:3.9.10-4.el9_0.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: cpython: tarfile: ReDos via excessive backtracking while parsing header values"
}
]
}
CERTFR-2025-AVI-0170
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 12.2.4 IF4 | ||
| IBM | QRadar | QRadar Data Synchronization versions antérieures à 3.2.1 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 iFix 02 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x sans le correctif de sécurité temporaire PH16353 ou antérieures à 9.0.5.2 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.x antérieures à 6.1.0.2 iFix 02 | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 4.x sans le dernier correctif de sécurité | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 IF2 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.0.x antérieures à 6.0.3.1 iFix 02 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.1 iFix 01 | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 5.x antérieures à 5.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 12.2.4 IF4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Data Synchronization versions ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x sans le correctif de s\u00e9curit\u00e9 temporaire PH16353 ou ant\u00e9rieures \u00e0 9.0.5.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.2 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 4.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.1 iFix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 5.x ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21536"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35946"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2015-7450",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7450"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2018-19797",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19797"
},
{
"name": "CVE-2023-28523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28523"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2023-31124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2018-19827",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19827"
},
{
"name": "CVE-2018-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11694"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2022-4904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40094"
},
{
"name": "CVE-2023-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24807"
},
{
"name": "CVE-2025-22150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22150"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2023-31147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-56340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56340"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2024-45216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45216"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-28527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28527"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2019-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6286"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2018-19839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19839"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-45217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45217"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2018-20821",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20821"
},
{
"name": "CVE-2019-6283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6283"
},
{
"name": "CVE-2023-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35947"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30204"
},
{
"name": "CVE-2018-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20190"
},
{
"name": "CVE-2023-28526",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28526"
},
{
"name": "CVE-2023-28155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28155"
},
{
"name": "CVE-2018-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11698"
},
{
"name": "CVE-2025-0823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0823"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2020-7598",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7598"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183676",
"url": "https://www.ibm.com/support/pages/node/7183676"
},
{
"published_at": "2019-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1107105",
"url": "https://www.ibm.com/support/pages/node/1107105"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184475",
"url": "https://www.ibm.com/support/pages/node/7184475"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184474",
"url": "https://www.ibm.com/support/pages/node/7184474"
},
{
"published_at": "2025-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184092",
"url": "https://www.ibm.com/support/pages/node/7184092"
},
{
"published_at": "2025-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184217",
"url": "https://www.ibm.com/support/pages/node/7184217"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184476",
"url": "https://www.ibm.com/support/pages/node/7184476"
}
]
}
CERTFR-2025-AVI-1054
Vulnerability from certfr_avis - Published: 2025-12-01 - Updated: 2025-12-01
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.954.x | ||
| VMware | Tanzu Application Service | Stemcells (Ubuntu Noble) versions antérieures à 1.134.x | ||
| VMware | Tanzu Operations Manager | Tanzu Platform versions antérieures à 3.1.5-build.398 | ||
| VMware | Tanzu Operations Manager | Tanzu Platform versions antérieures à 3.2.1-build.271 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.134.x",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.5-build.398",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.1-build.271",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-12-01T00:00:00",
"last_revision_date": "2025-12-01T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1054",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36558",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36558"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36554",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36554"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36552",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36552"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36559",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36559"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36557",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36557"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36556",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36556"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36553",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36553"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36555",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36555"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0055
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.60 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise CC Common Application Objects version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.61 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise SCM Purchasing version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FIN Cash Management version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FIN eSettlements version 9.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "PeopleSoft Enterprise PeopleTools version 8.60",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise CC Common Application Objects version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools version 8.61",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise SCM Purchasing version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FIN Cash Management version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FIN eSettlements version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-21562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21562"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21537"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2025-21561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21561"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2025-21545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21545"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21530"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-21563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21563"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0055",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle PeopleSoft cpujan2025",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
]
}
CERTFR-2024-AVI-0958
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x antérieures à 2.3.4.1 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.13 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.2 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | AIX | AIX version 7.3 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.3 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 IF01 | ||
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.0 avec Db2 versions antérieures à 11.5.9 Special Build | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix03 | ||
| IBM | VIOS | VIOS version 3.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.27.0 | ||
| IBM | Cloud Transformation Advisor | Cloud Transformation Advisor versions antérieures à 3.10.2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.10.27.0 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix14 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.15 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cloud Pak System versions 2.3.4.x ant\u00e9rieures \u00e0 2.3.4.1",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.13",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.2 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak System versions 2.3.4.0 avec Db2 versions ant\u00e9rieures \u00e0 11.5.9 Special Build",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix03",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 3.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.27.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Transformation Advisor versions ant\u00e9rieures \u00e0 3.10.2 ",
"product": {
"name": "Cloud Transformation Advisor",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.27.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.0 iFix14",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.15",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2022-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23181"
},
{
"name": "CVE-2021-42340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
},
{
"name": "CVE-2022-29885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
},
{
"name": "CVE-2022-34305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34305"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2022-25762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
},
{
"name": "CVE-2022-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42252"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2023-28708",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28708"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26667"
},
{
"name": "CVE-2023-52608",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26727"
},
{
"name": "CVE-2024-26718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26718"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26710"
},
{
"name": "CVE-2024-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2017-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11468"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2021-46939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
},
{
"name": "CVE-2024-26870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-27388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
},
{
"name": "CVE-2024-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2021-47231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
},
{
"name": "CVE-2021-47284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47284"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47408"
},
{
"name": "CVE-2021-47449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47449"
},
{
"name": "CVE-2021-47461",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47461"
},
{
"name": "CVE-2021-47468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
},
{
"name": "CVE-2021-47491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47491"
},
{
"name": "CVE-2021-47548",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47548"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52707"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52756"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-26940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26940"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35938"
},
{
"name": "CVE-2024-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2024-26962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26962"
},
{
"name": "CVE-2024-27434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35897"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-34069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2022-48743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
},
{
"name": "CVE-2022-48747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2024-26703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26703"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26824"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-36489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2021-47018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47018"
},
{
"name": "CVE-2021-47257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47257"
},
{
"name": "CVE-2021-47304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47304"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2021-47624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52471"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2023-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
},
{
"name": "CVE-2023-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2024-43833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2021-42694",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42694"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2021-43980",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43980"
},
{
"name": "CVE-2023-20584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20584"
},
{
"name": "CVE-2023-31356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31356"
},
{
"name": "CVE-2023-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36328"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2023-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5115"
},
{
"name": "CVE-2023-52596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52596"
},
{
"name": "CVE-2023-5764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5764"
},
{
"name": "CVE-2024-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21529"
},
{
"name": "CVE-2024-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
},
{
"name": "CVE-2024-25620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25620"
},
{
"name": "CVE-2024-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26147"
},
{
"name": "CVE-2024-26713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26713"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-26823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26823"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-31882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31882"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-35136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35136"
},
{
"name": "CVE-2024-35152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35152"
},
{
"name": "CVE-2024-37529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37529"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2024-42254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42254"
},
{
"name": "CVE-2024-42255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42255"
},
{
"name": "CVE-2024-42256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42256"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43857"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2024-46982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46982"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0958",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174802",
"url": "https://www.ibm.com/support/pages/node/7174802"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174634",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174639",
"url": "https://www.ibm.com/support/pages/node/7174639"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175196",
"url": "https://www.ibm.com/support/pages/node/7175196"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175086",
"url": "https://www.ibm.com/support/pages/node/7175086"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175192",
"url": "https://www.ibm.com/support/pages/node/7175192"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174799",
"url": "https://www.ibm.com/support/pages/node/7174799"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174797",
"url": "https://www.ibm.com/support/pages/node/7174797"
},
{
"published_at": "2024-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174945",
"url": "https://www.ibm.com/support/pages/node/7174945"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174912",
"url": "https://www.ibm.com/support/pages/node/7174912"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175166",
"url": "https://www.ibm.com/support/pages/node/7175166"
}
]
}
CERTFR-2025-AVI-0086
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | AIX | AIX versions 7.3.0 sans le correctif de sécurité APAR IJ50827 | ||
| IBM | VIOS | VIOS versions 3.1.3 antérieures à 3.1.3 sans le correctif de sécurité APAR IJ50828 | ||
| IBM | Sterling Connect:Direct | IBM Sterling B2B Integrator versions 6.2.0.x antérieures à 6.2.0.4 | ||
| IBM | AIX | AIX versions 7.3.2 antérieures à 7.3.1 SP02 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.0 sans les derniers correctifs de sécurité | ||
| IBM | AIX | AIX versions 7.3.1 antérieures à 7.3.1 SP04 | ||
| IBM | Sterling Connect:Direct | IBM Sterling B2B Integrator versions 6.0.x à 6.1.2.5 antérieures à 6.1.2.6 | ||
| IBM | AIX | AIX versions 7.2.x antérieures à 7.2.5 SP08 | ||
| IBM | VIOS | VIOS versions 4.1.0 antérieures à 4.1.20 | ||
| IBM | QRadar | IBM QRadar Network Packet Capture versions 7.5.0 antérieures à 7.5.0 Update Package 11 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect versions 6.1.x antérieures à 6.1.0.27 | ||
| IBM | VIOS | VIOS versions 3.1.4 antérieures à 3.1.4.40 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "AIX versions 7.3.0 sans le correctif de s\u00e9curit\u00e9 APAR IJ50827",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1.3 ant\u00e9rieures \u00e0 3.1.3 sans le correctif de s\u00e9curit\u00e9 \n APAR IJ50828",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.4",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.3.2 ant\u00e9rieures \u00e0 7.3.1 SP02",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.0 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.3.1 ant\u00e9rieures \u00e0 7.3.1 SP04",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.0.x \u00e0 6.1.2.5 ant\u00e9rieures \u00e0 6.1.2.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2.x ant\u00e9rieures \u00e0 7.2.5 SP08",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 4.1.0 ant\u00e9rieures \u00e0 4.1.20",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Packet Capture versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 Update Package 11",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.27",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1.4 ant\u00e9rieures \u00e0 3.1.4.40",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-31315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31315"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2023-20584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20584"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5742"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2023-31356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31356"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2022-34917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34917"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2020-27511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27511"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0086",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182001",
"url": "https://www.ibm.com/support/pages/node/7182001"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182015",
"url": "https://www.ibm.com/support/pages/node/7182015"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182000",
"url": "https://www.ibm.com/support/pages/node/7182000"
},
{
"published_at": "2025-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181893",
"url": "https://www.ibm.com/support/pages/node/7181893"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182042",
"url": "https://www.ibm.com/support/pages/node/7182042"
},
{
"published_at": "2025-01-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150641",
"url": "https://www.ibm.com/support/pages/node/7150641"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182056",
"url": "https://www.ibm.com/support/pages/node/7182056"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182052",
"url": "https://www.ibm.com/support/pages/node/7182052"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0967
Vulnerability from certfr_avis - Published: 2025-11-05 - Updated: 2025-11-05
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | File Integrity Monitoring pour VMware Tanzu Platform versions antérieures à 2.1.49 | ||
| VMware | Tanzu Platform | Cloud Service Broker pour Azure pour VMware Tanzu Platform versions antérieures à 1.13.1 | ||
| VMware | Tanzu Platform | AI Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Platform | Scheduler pour VMware Tanzu Platform versions antérieures à 2.0.21 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.4 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Platform | .NET Core Buildpack versions antérieures à 2.4.64 | ||
| VMware | Tanzu Platform | VMware Tanzu Data Flow sur Tanzu Platform versions antérieures à 2.0.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.4 | ||
| VMware | Tanzu Platform | CredHub Secrets Management pour VMware Tanzu Platform versions antérieures à 1.6.7 | ||
| VMware | Tanzu Platform | Extended App Support pour Tanzu Platform versions antérieures à 1.0.8 | ||
| VMware | Tanzu Platform | Go Buildpack versions antérieures à 1.10.57 | ||
| VMware | Tanzu Platform | VMware Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Platform | NodeJS Buildpack versions antérieures à 1.8.61 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.0 | ||
| VMware | Tanzu Platform | Application Services pour VMware Tanzu Platform versions antérieures à 3.3.11 | ||
| VMware | Tanzu Platform | IPsec Encryption pour VMware Tanzu Platform versions antérieures à 1.9.68 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "File Integrity Monitoring pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.1.49",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Service Broker pour Azure pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.13.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.21",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": ".NET Core Buildpack versions ant\u00e9rieures \u00e0 2.4.64",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Data Flow sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.8",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Go Buildpack versions ant\u00e9rieures \u00e0 1.10.57",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.61",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Application Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.3.11",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "IPsec Encryption pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.9.68",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-7409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7409"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2024-6505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6505"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-43484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43484"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-54798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54798"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2024-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3447"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38229"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-43483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43483"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-58446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58446"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3446"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-4467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4467"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2023-30584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30584"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2024-43485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43485"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2025-6242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6242"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-61620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61620"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-11-05T00:00:00",
"last_revision_date": "2025-11-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0967",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36323",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36323"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36343",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36343"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-99",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36326"
},
{
"published_at": "2025-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36305",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36305"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36345",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36345"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36329"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-81",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36316"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36331"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36334",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36334"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36335",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36335"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36340",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36340"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36319",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36319"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36339",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36339"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36322",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36322"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36321",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36321"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36324"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36336",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36336"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36318",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36318"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36337",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36337"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36346",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36346"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-81",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36315"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36317",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36317"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36344",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36344"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36341",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36341"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36314",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36314"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36330"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36332",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36332"
},
{
"published_at": "2025-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36304",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36304"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36342",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36342"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36333",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36333"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-99",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36327"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36338",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36338"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36328"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36325"
}
]
}
CERTFR-2025-AVI-1024
Vulnerability from certfr_avis - Published: 2025-11-19 - Updated: 2025-11-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.31.1 | ||
| VMware | Tanzu Gemfire | Tanzu Gemfire versions antérieures à 10.1.5 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.6.1 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Gemfire versions ant\u00e9rieures \u00e0 10.1.5",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.6.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-11-19T00:00:00",
"last_revision_date": "2025-11-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1024",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36459",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36459"
},
{
"published_at": "2025-11-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36460",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36460"
},
{
"published_at": "2025-11-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36461",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36461"
}
]
}
CERTFR-2025-AVI-0279
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | Db2 versions antérieures à 5.1.2 pour Cloud Pak for Data | ||
| IBM | WebSphere | WebSphere Application Server Liberty sans le correctif APAR PH65394 | ||
| IBM | Db2 Warehouse | Db2 Warehouse versions antérieures à 5.1.2 pour Cloud Pak for Data | ||
| IBM | WebSphere | WebSphere Hybrid Edition sans le dernier correctif de sécurité | ||
| IBM | QRadar Analyst Workflow | QRadar Analyst Workflow versions antérieures à 3.0.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.1.2 pour Cloud Pak for Data",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty sans le correctif APAR PH65394",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse versions ant\u00e9rieures \u00e0 5.1.2 pour Cloud Pak for Data",
"product": {
"name": "Db2 Warehouse",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Analyst Workflow versions ant\u00e9rieures \u00e0 3.0.0",
"product": {
"name": "QRadar Analyst Workflow",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-37071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37071"
},
{
"name": "CVE-2025-25285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25285"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-34997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34997"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-41761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41761"
},
{
"name": "CVE-2022-29153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29153"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2018-6341",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6341"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2025-25288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25288"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2025-25290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25290"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2020-13844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13844"
},
{
"name": "CVE-2024-26776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26776"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2024-41762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41762"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2025-23184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23184"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-40679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40679"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2019-11253",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11253"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2025-25289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25289"
},
{
"name": "CVE-2024-45663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45663"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-36620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36620"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0279",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-04-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7230024",
"url": "https://www.ibm.com/support/pages/node/7230024"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229770",
"url": "https://www.ibm.com/support/pages/node/7229770"
},
{
"published_at": "2025-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229443",
"url": "https://www.ibm.com/support/pages/node/7229443"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229768",
"url": "https://www.ibm.com/support/pages/node/7229768"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229772",
"url": "https://www.ibm.com/support/pages/node/7229772"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
CERTFR-2025-AVI-0279
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | Db2 versions antérieures à 5.1.2 pour Cloud Pak for Data | ||
| IBM | WebSphere | WebSphere Application Server Liberty sans le correctif APAR PH65394 | ||
| IBM | Db2 Warehouse | Db2 Warehouse versions antérieures à 5.1.2 pour Cloud Pak for Data | ||
| IBM | WebSphere | WebSphere Hybrid Edition sans le dernier correctif de sécurité | ||
| IBM | QRadar Analyst Workflow | QRadar Analyst Workflow versions antérieures à 3.0.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.1.2 pour Cloud Pak for Data",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty sans le correctif APAR PH65394",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse versions ant\u00e9rieures \u00e0 5.1.2 pour Cloud Pak for Data",
"product": {
"name": "Db2 Warehouse",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Analyst Workflow versions ant\u00e9rieures \u00e0 3.0.0",
"product": {
"name": "QRadar Analyst Workflow",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-37071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37071"
},
{
"name": "CVE-2025-25285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25285"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-34997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34997"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-41761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41761"
},
{
"name": "CVE-2022-29153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29153"
},
{
"name": "CVE-2023-52605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52605"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2018-6341",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6341"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2025-25288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25288"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2025-25290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25290"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2020-13844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13844"
},
{
"name": "CVE-2024-26776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26776"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2024-41762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41762"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2025-23184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23184"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-40679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40679"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2019-11253",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11253"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2025-25289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25289"
},
{
"name": "CVE-2024-45663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45663"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-36620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36620"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0279",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-04-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7230024",
"url": "https://www.ibm.com/support/pages/node/7230024"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229770",
"url": "https://www.ibm.com/support/pages/node/7229770"
},
{
"published_at": "2025-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229443",
"url": "https://www.ibm.com/support/pages/node/7229443"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229768",
"url": "https://www.ibm.com/support/pages/node/7229768"
},
{
"published_at": "2025-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7229772",
"url": "https://www.ibm.com/support/pages/node/7229772"
}
]
}
CERTFR-2024-AVI-0958
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x antérieures à 2.3.4.1 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.13 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.2 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | AIX | AIX version 7.3 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.3 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 IF01 | ||
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.0 avec Db2 versions antérieures à 11.5.9 Special Build | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix03 | ||
| IBM | VIOS | VIOS version 3.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.27.0 | ||
| IBM | Cloud Transformation Advisor | Cloud Transformation Advisor versions antérieures à 3.10.2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.10.27.0 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix14 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.15 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cloud Pak System versions 2.3.4.x ant\u00e9rieures \u00e0 2.3.4.1",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.13",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.2 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak System versions 2.3.4.0 avec Db2 versions ant\u00e9rieures \u00e0 11.5.9 Special Build",
"product": {
"name": "Cloud Pak System",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix03",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 3.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.27.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Transformation Advisor versions ant\u00e9rieures \u00e0 3.10.2 ",
"product": {
"name": "Cloud Transformation Advisor",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.27.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.0 iFix14",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.15",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2022-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23181"
},
{
"name": "CVE-2021-42340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
},
{
"name": "CVE-2022-29885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
},
{
"name": "CVE-2022-34305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34305"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2022-25762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
},
{
"name": "CVE-2022-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42252"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2023-28708",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28708"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
},
{
"name": "CVE-2023-52463",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
},
{
"name": "CVE-2023-52599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-52530",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
},
{
"name": "CVE-2024-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
},
{
"name": "CVE-2023-52609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26667"
},
{
"name": "CVE-2023-52608",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
},
{
"name": "CVE-2023-52486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
},
{
"name": "CVE-2024-26614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26727"
},
{
"name": "CVE-2024-26718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26718"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26710"
},
{
"name": "CVE-2024-26810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-26772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2017-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11468"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2021-46939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
},
{
"name": "CVE-2024-26870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
},
{
"name": "CVE-2024-26843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
},
{
"name": "CVE-2024-26925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
},
{
"name": "CVE-2024-27388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
},
{
"name": "CVE-2024-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
},
{
"name": "CVE-2024-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
},
{
"name": "CVE-2024-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2021-47231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
},
{
"name": "CVE-2021-47284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47284"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47408"
},
{
"name": "CVE-2021-47449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47449"
},
{
"name": "CVE-2021-47461",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47461"
},
{
"name": "CVE-2021-47468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
},
{
"name": "CVE-2021-47491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47491"
},
{
"name": "CVE-2021-47548",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47548"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52707"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52756"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-26940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26940"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35938"
},
{
"name": "CVE-2024-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2024-26962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26962"
},
{
"name": "CVE-2024-27434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35897"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-34069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2022-48743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
},
{
"name": "CVE-2022-48747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2024-26703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26703"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26824"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-36489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2021-47018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47018"
},
{
"name": "CVE-2021-47257",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47257"
},
{
"name": "CVE-2021-47304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47304"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2021-47624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52471"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-42232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
},
{
"name": "CVE-2024-42236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-42247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
},
{
"name": "CVE-2023-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
},
{
"name": "CVE-2023-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2024-43833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
},
{
"name": "CVE-2024-43858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
},
{
"name": "CVE-2021-42694",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42694"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-42251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
},
{
"name": "CVE-2021-43980",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43980"
},
{
"name": "CVE-2023-20584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20584"
},
{
"name": "CVE-2023-31356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31356"
},
{
"name": "CVE-2023-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36328"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2023-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5115"
},
{
"name": "CVE-2023-52596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52596"
},
{
"name": "CVE-2023-5764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5764"
},
{
"name": "CVE-2024-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21529"
},
{
"name": "CVE-2024-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
},
{
"name": "CVE-2024-25620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25620"
},
{
"name": "CVE-2024-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26147"
},
{
"name": "CVE-2024-26713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26713"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-26823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26823"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-31882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31882"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-35136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35136"
},
{
"name": "CVE-2024-35152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35152"
},
{
"name": "CVE-2024-37529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37529"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2024-42254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42254"
},
{
"name": "CVE-2024-42255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42255"
},
{
"name": "CVE-2024-42256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42256"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43857"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-45801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
},
{
"name": "CVE-2024-46982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46982"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2024-47875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0958",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174802",
"url": "https://www.ibm.com/support/pages/node/7174802"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174634",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"published_at": "2024-11-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174639",
"url": "https://www.ibm.com/support/pages/node/7174639"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175196",
"url": "https://www.ibm.com/support/pages/node/7175196"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175086",
"url": "https://www.ibm.com/support/pages/node/7175086"
},
{
"published_at": "2024-11-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175192",
"url": "https://www.ibm.com/support/pages/node/7175192"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174799",
"url": "https://www.ibm.com/support/pages/node/7174799"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174797",
"url": "https://www.ibm.com/support/pages/node/7174797"
},
{
"published_at": "2024-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174945",
"url": "https://www.ibm.com/support/pages/node/7174945"
},
{
"published_at": "2024-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7174912",
"url": "https://www.ibm.com/support/pages/node/7174912"
},
{
"published_at": "2024-11-07",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7175166",
"url": "https://www.ibm.com/support/pages/node/7175166"
}
]
}
CERTFR-2025-AVI-1024
Vulnerability from certfr_avis - Published: 2025-11-19 - Updated: 2025-11-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.31.1 | ||
| VMware | Tanzu Gemfire | Tanzu Gemfire versions antérieures à 10.1.5 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.6.1 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Gemfire versions ant\u00e9rieures \u00e0 10.1.5",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.6.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-11-19T00:00:00",
"last_revision_date": "2025-11-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1024",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36459",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36459"
},
{
"published_at": "2025-11-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36460",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36460"
},
{
"published_at": "2025-11-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36461",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36461"
}
]
}
CERTFR-2025-AVI-1036
Vulnerability from certfr_avis - Published: 2025-11-24 - Updated: 2025-11-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à 2.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.954.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.126.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Platform Services | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Metric Store versions antérieures à 1.8.1 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu | VMware Tanzu pour Postgres on Tanzu Platform versions antérieures à 10.2.1 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.954.x | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.92.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.954.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "App Metrics versions ant\u00e9rieures \u00e0 2.3.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.126.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Platform Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Metric Store versions ant\u00e9rieures \u00e0 1.8.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Postgres on Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.92.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-13425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13425"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-64329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64329"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-59530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59530"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5981"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-24T00:00:00",
"last_revision_date": "2025-11-24T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1036",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36513",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36513"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36530",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36530"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36512",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36512"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36526",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36526"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36511",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36511"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36525",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36525"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36516",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36516"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36527",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36527"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36536",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36536"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36519",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36519"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36518",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36518"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36524",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36524"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36521",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36521"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36528",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36528"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36522",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36522"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36514",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36514"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36532",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36532"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36509",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36509"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36517",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36517"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36533",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36533"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36537",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36537"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36531",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36531"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36510",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36510"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36523",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36523"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36515",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36515"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36529",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36529"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36534",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36534"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36535",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36535"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36520",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36520"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-1036
Vulnerability from certfr_avis - Published: 2025-11-24 - Updated: 2025-11-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à 2.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.954.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.126.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Platform Services | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Metric Store versions antérieures à 1.8.1 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu | VMware Tanzu pour Postgres on Tanzu Platform versions antérieures à 10.2.1 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.954.x | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.92.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.954.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "App Metrics versions ant\u00e9rieures \u00e0 2.3.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.126.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Platform Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Metric Store versions ant\u00e9rieures \u00e0 1.8.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Postgres on Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.92.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-13425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13425"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-64329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64329"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-59530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59530"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5981"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-24T00:00:00",
"last_revision_date": "2025-11-24T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1036",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36513",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36513"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36530",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36530"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36512",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36512"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36526",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36526"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36511",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36511"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36525",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36525"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36516",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36516"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36527",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36527"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36536",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36536"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36519",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36519"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36518",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36518"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36524",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36524"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36521",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36521"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36528",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36528"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36522",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36522"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36514",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36514"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36532",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36532"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36509",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36509"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36517",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36517"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36533",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36533"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36537",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36537"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36531",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36531"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36510",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36510"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36523",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36523"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36515",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36515"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36529",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36529"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36534",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36534"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36535",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36535"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36520",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36520"
}
]
}
CERTFR-2025-AVI-0304
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur indique que les versions 21.4.x de Junos OS pour SRX Series ne bénéficient pas de correctif pour la vulnérabilité CVE-2025-30659.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 21.4.x antérieures à 21.4R3-S10 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.4.x-EVO antérieures à 22.4R3-S6-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4.x-EVO antérieures à 23.4R2-S4-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 22.2.x antérieures à 22.2R3-S6 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.4R3-S10-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2.x-EVO antérieures à 23.2R2-S3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2.x-EVO antérieures à 24.2R2-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 24.1R3 | ||
| Juniper Networks | Junos Space | Junos Space Security Director versions antérieures à 24.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4.x antérieures à 23.4R2-S4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.2.x-EVO antérieures à 22.2R3-S6-EVO | ||
| Juniper Networks | CTPView | CTPView versions antérieures à 9.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 22.4.x antérieures à 22.4R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS versions 23.2.x antérieures à 23.2R2-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2.x antérieures à 24.2R2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.2R3-S9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 21.4.x ant\u00e9rieures \u00e0 21.4R3-S10 ",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4.x-EVO ant\u00e9rieures \u00e0 22.4R3-S6-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4.x-EVO ant\u00e9rieures \u00e0 23.4R2-S4-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2.x ant\u00e9rieures \u00e0 22.2R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S10-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2.x-EVO ant\u00e9rieures \u00e0 23.2R2-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2.x-EVO ant\u00e9rieures \u00e0 24.2R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R3",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space Security Director versions ant\u00e9rieures \u00e0 24.1R3",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4.x ant\u00e9rieures \u00e0 23.4R2-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2.x-EVO ant\u00e9rieures \u00e0 22.2R3-S6-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPView versions ant\u00e9rieures \u00e0 9.2R1",
"product": {
"name": "CTPView",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4.x ant\u00e9rieures \u00e0 22.4R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2.x ant\u00e9rieures \u00e0 23.2R2-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2.x ant\u00e9rieures \u00e0 24.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "L\u0027\u00e9diteur indique que les versions 21.4.x de Junos OS pour SRX Series ne b\u00e9n\u00e9ficient pas de correctif pour la vuln\u00e9rabilit\u00e9 CVE-2025-30659.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2025-21597",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21597"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-4076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4076"
},
{
"name": "CVE-2025-30658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30658"
},
{
"name": "CVE-2024-40866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40866"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40898"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2011-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5094"
},
{
"name": "CVE-2025-30657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30657"
},
{
"name": "CVE-2025-30660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30660"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
},
{
"name": "CVE-2024-44187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44187"
},
{
"name": "CVE-2025-21601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21601"
},
{
"name": "CVE-2024-32021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
},
{
"name": "CVE-2024-40725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40725"
},
{
"name": "CVE-2019-7611",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7611"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21591"
},
{
"name": "CVE-2025-30649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30649"
},
{
"name": "CVE-2025-30652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30652"
},
{
"name": "CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2025-30651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30651"
},
{
"name": "CVE-2024-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
},
{
"name": "CVE-2024-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39884"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-32020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-27838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27838"
},
{
"name": "CVE-2024-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23271"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-30647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30647"
},
{
"name": "CVE-2024-32465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
},
{
"name": "CVE-2011-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1473"
},
{
"name": "CVE-2025-30654",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30654"
},
{
"name": "CVE-2025-30655",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30655"
},
{
"name": "CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2021-47596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47596"
},
{
"name": "CVE-2025-30659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30659"
},
{
"name": "CVE-2025-30653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30653"
},
{
"name": "CVE-2025-30645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30645"
},
{
"name": "CVE-2020-7021",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7021"
},
{
"name": "CVE-2021-22135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22135"
},
{
"name": "CVE-2025-30646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30646"
},
{
"name": "CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"name": "CVE-2025-30644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30644"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-30656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30656"
},
{
"name": "CVE-2022-39253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39253"
},
{
"name": "CVE-2021-22144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22144"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2025-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21595"
},
{
"name": "CVE-2025-30648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30648"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2021-22137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22137"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2025-21594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21594"
},
{
"name": "CVE-2020-7020",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7020"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0304",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96456",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-malformed-LLDP-TLV-results-in-l2cpd-crash-CVE-2025-30646"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96447",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R3-release"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96467",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-Processing-of-a-specific-BGP-update-causes-the-SRRD-process-to-crash-CVE-2025-30657?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96461",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-ICMPv6-packet-causes-a-memory-overrun-leading-to-an-rpd-crash-CVE-2025-30651"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96446",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R3-release"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96451",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-BGP-rib-sharding-and-update-threading-are-configured-and-a-peer-flaps-an-rpd-core-is-observed"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96470",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-SRX-Series-A-device-configured-for-vector-routing-crashes-when-receiving-specific-traffic-CVE-2025-30659?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96458",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specifically-malformed-DHCP-packet-causes-jdhcpd-process-to-crash-CVE-2025-30648"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96462",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Executing-a-specific-CLI-command-when-asregex-optimized-is-configured-causes-an-RPD-crash-CVE-2025-30652"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96457",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX-Series-Subscriber-login-logout-activity-will-lead-to-a-memory-leak-CVE-2025-30647"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96466",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX-Series-SRX-Series-Processing-of-specific-SIP-INVITE-messages-by-the-SIP-ALG-will-lead-to-an-FPC-crash-CVE-2025-30656?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96463",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-LSP-flap-in-a-specific-MPLS-LSP-scenario-leads-to-RPD-crash-CVE-2025-30653"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96459",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX240-MX480-MX960-with-SPC3-An-attacker-sending-specific-packets-will-cause-a-CPU-utilization-DoS-CVE-2025-30649"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96450",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-VXLAN-scenario-specific-ARP-or-NDP-packets-cause-FPC-to-crash-CVE-2025-21595"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96464",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-local-low-privileged-user-can-access-sensitive-information-CVE-2025-30654"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96453",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-EX2300-EX3400-EX4000-Series-QFX5k-Series-Receipt-of-a-specific-DHCP-packet-causes-FPC-crash-when-DHCP-Option-82-is-enabled-CVE-2025-30644"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96465",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-CLI-command-will-cause-a-RPD-crash-when-rib-sharding-and-update-threading-is-enabled-CVE-2025-30655?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96444",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-CTP-View-Multiple-Vulnerabilities-resolved-in-9-2R1-release"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96469",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-SRX-Series-On-devices-with-Anti-Virus-enabled-malicious-server-responses-will-cause-memory-to-leak-ultimately-causing-forwarding-to-stop-CVE-2025-30658?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96448",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-An-unauthenticated-adjacent-attacker-sending-a-malformed-DHCP-packet-causes-jdhcpd-to-crash-CVE-2025-21591"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96471",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX-Series-Decapsulation-of-specific-GRE-packets-leads-to-PFE-reset-CVE-2025-30660?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96449",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX-Series-In-DS-lite-and-NAT-senario-receipt-of-crafted-IPv4-traffic-causes-port-block-CVE-2025-21594"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96455",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-SRX-Series-Transmission-of-specific-control-traffic-sent-out-of-a-DS-Lite-tunnel-results-in-flowd-crash-CVE-2025-30645"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96452",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-SRX-and-EX-Series-MX240-MX480-MX960-QFX5120-Series-When-web-management-is-enabled-for-specific-services-an-attacker-may-cause-a-CPU-spike-by-sending-genuine-packets-to-the-device-CVE-2025-21601"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis - Published: 2025-10-13 - Updated: 2025-10-13
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CERTFR-2025-AVI-0304
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur indique que les versions 21.4.x de Junos OS pour SRX Series ne bénéficient pas de correctif pour la vulnérabilité CVE-2025-30659.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 21.4.x antérieures à 21.4R3-S10 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.4.x-EVO antérieures à 22.4R3-S6-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.4.x-EVO antérieures à 23.4R2-S4-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions 22.2.x antérieures à 22.2R3-S6 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 21.4R3-S10-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 23.2.x-EVO antérieures à 23.2R2-S3-EVO | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 24.2.x-EVO antérieures à 24.2R2-EVO | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 24.1R3 | ||
| Juniper Networks | Junos Space | Junos Space Security Director versions antérieures à 24.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 23.4.x antérieures à 23.4R2-S4 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions 22.2.x-EVO antérieures à 22.2R3-S6-EVO | ||
| Juniper Networks | CTPView | CTPView versions antérieures à 9.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 22.4.x antérieures à 22.4R3-S6 | ||
| Juniper Networks | Junos OS | Junos OS versions 23.2.x antérieures à 23.2R2-S3 | ||
| Juniper Networks | Junos OS | Junos OS versions 24.2.x antérieures à 24.2R2 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 21.2R3-S9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS versions 21.4.x ant\u00e9rieures \u00e0 21.4R3-S10 ",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.4.x-EVO ant\u00e9rieures \u00e0 22.4R3-S6-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.4.x-EVO ant\u00e9rieures \u00e0 23.4R2-S4-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.2.x ant\u00e9rieures \u00e0 22.2R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S10-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 23.2.x-EVO ant\u00e9rieures \u00e0 23.2R2-S3-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 24.2.x-EVO ant\u00e9rieures \u00e0 24.2R2-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 24.1R3",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space Security Director versions ant\u00e9rieures \u00e0 24.1R3",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.4.x ant\u00e9rieures \u00e0 23.4R2-S4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions 22.2.x-EVO ant\u00e9rieures \u00e0 22.2R3-S6-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "CTPView versions ant\u00e9rieures \u00e0 9.2R1",
"product": {
"name": "CTPView",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 22.4.x ant\u00e9rieures \u00e0 22.4R3-S6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 23.2.x ant\u00e9rieures \u00e0 23.2R2-S3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 24.2.x ant\u00e9rieures \u00e0 24.2R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "L\u0027\u00e9diteur indique que les versions 21.4.x de Junos OS pour SRX Series ne b\u00e9n\u00e9ficient pas de correctif pour la vuln\u00e9rabilit\u00e9 CVE-2025-30659.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2025-21597",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21597"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-4076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4076"
},
{
"name": "CVE-2025-30658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30658"
},
{
"name": "CVE-2024-40866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40866"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40898"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2011-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5094"
},
{
"name": "CVE-2025-30657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30657"
},
{
"name": "CVE-2025-30660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30660"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
},
{
"name": "CVE-2024-44187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44187"
},
{
"name": "CVE-2025-21601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21601"
},
{
"name": "CVE-2024-32021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
},
{
"name": "CVE-2024-40725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40725"
},
{
"name": "CVE-2019-7611",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7611"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21591"
},
{
"name": "CVE-2025-30649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30649"
},
{
"name": "CVE-2025-30652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30652"
},
{
"name": "CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2025-30651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30651"
},
{
"name": "CVE-2024-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
},
{
"name": "CVE-2024-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39884"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-32020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-27838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27838"
},
{
"name": "CVE-2024-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23271"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-30647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30647"
},
{
"name": "CVE-2024-32465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
},
{
"name": "CVE-2011-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1473"
},
{
"name": "CVE-2025-30654",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30654"
},
{
"name": "CVE-2025-30655",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30655"
},
{
"name": "CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2021-47596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47596"
},
{
"name": "CVE-2025-30659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30659"
},
{
"name": "CVE-2025-30653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30653"
},
{
"name": "CVE-2025-30645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30645"
},
{
"name": "CVE-2020-7021",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7021"
},
{
"name": "CVE-2021-22135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22135"
},
{
"name": "CVE-2025-30646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30646"
},
{
"name": "CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"name": "CVE-2025-30644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30644"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-30656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30656"
},
{
"name": "CVE-2022-39253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39253"
},
{
"name": "CVE-2021-22144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22144"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2025-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21595"
},
{
"name": "CVE-2025-30648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30648"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2021-22137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22137"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2022-24808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24808"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2025-21594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21594"
},
{
"name": "CVE-2020-7020",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7020"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0304",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96456",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-malformed-LLDP-TLV-results-in-l2cpd-crash-CVE-2025-30646"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96447",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R3-release"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96467",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-Processing-of-a-specific-BGP-update-causes-the-SRRD-process-to-crash-CVE-2025-30657?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96461",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-ICMPv6-packet-causes-a-memory-overrun-leading-to-an-rpd-crash-CVE-2025-30651"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96446",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R3-release"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96451",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-BGP-rib-sharding-and-update-threading-are-configured-and-a-peer-flaps-an-rpd-core-is-observed"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96470",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-SRX-Series-A-device-configured-for-vector-routing-crashes-when-receiving-specific-traffic-CVE-2025-30659?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96458",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specifically-malformed-DHCP-packet-causes-jdhcpd-process-to-crash-CVE-2025-30648"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96462",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Executing-a-specific-CLI-command-when-asregex-optimized-is-configured-causes-an-RPD-crash-CVE-2025-30652"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96457",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX-Series-Subscriber-login-logout-activity-will-lead-to-a-memory-leak-CVE-2025-30647"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96466",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX-Series-SRX-Series-Processing-of-specific-SIP-INVITE-messages-by-the-SIP-ALG-will-lead-to-an-FPC-crash-CVE-2025-30656?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96463",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-LSP-flap-in-a-specific-MPLS-LSP-scenario-leads-to-RPD-crash-CVE-2025-30653"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96459",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX240-MX480-MX960-with-SPC3-An-attacker-sending-specific-packets-will-cause-a-CPU-utilization-DoS-CVE-2025-30649"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96450",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-EVPN-VXLAN-scenario-specific-ARP-or-NDP-packets-cause-FPC-to-crash-CVE-2025-21595"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96464",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-local-low-privileged-user-can-access-sensitive-information-CVE-2025-30654"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96453",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-EX2300-EX3400-EX4000-Series-QFX5k-Series-Receipt-of-a-specific-DHCP-packet-causes-FPC-crash-when-DHCP-Option-82-is-enabled-CVE-2025-30644"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96465",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-CLI-command-will-cause-a-RPD-crash-when-rib-sharding-and-update-threading-is-enabled-CVE-2025-30655?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96444",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-CTP-View-Multiple-Vulnerabilities-resolved-in-9-2R1-release"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96469",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-SRX-Series-On-devices-with-Anti-Virus-enabled-malicious-server-responses-will-cause-memory-to-leak-ultimately-causing-forwarding-to-stop-CVE-2025-30658?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96448",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-An-unauthenticated-adjacent-attacker-sending-a-malformed-DHCP-packet-causes-jdhcpd-to-crash-CVE-2025-21591"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96471",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX-Series-Decapsulation-of-specific-GRE-packets-leads-to-PFE-reset-CVE-2025-30660?language=en_US"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96449",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-MX-Series-In-DS-lite-and-NAT-senario-receipt-of-crafted-IPv4-traffic-causes-port-block-CVE-2025-21594"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96455",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-SRX-Series-Transmission-of-specific-control-traffic-sent-out-of-a-DS-Lite-tunnel-results-in-flowd-crash-CVE-2025-30645"
},
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA96452",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-OS-SRX-and-EX-Series-MX240-MX480-MX960-QFX5120-Series-When-web-management-is-enabled-for-specific-services-an-attacker-may-cause-a-CPU-spike-by-sending-genuine-packets-to-the-device-CVE-2025-21601"
}
]
}
CERTFR-2025-AVI-1054
Vulnerability from certfr_avis - Published: 2025-12-01 - Updated: 2025-12-01
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.954.x | ||
| VMware | Tanzu Application Service | Stemcells (Ubuntu Noble) versions antérieures à 1.134.x | ||
| VMware | Tanzu Operations Manager | Tanzu Platform versions antérieures à 3.1.5-build.398 | ||
| VMware | Tanzu Operations Manager | Tanzu Platform versions antérieures à 3.2.1-build.271 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.134.x",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.5-build.398",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.1-build.271",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-12-01T00:00:00",
"last_revision_date": "2025-12-01T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1054",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36558",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36558"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36554",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36554"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36552",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36552"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36559",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36559"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36557",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36557"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36556",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36556"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36553",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36553"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36555",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36555"
}
]
}
CERTFR-2024-AVI-0734
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans CPython. Elle permet à un attaquant de provoquer un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CPython versions ant\u00e9rieures \u00e0 3.13.0rc2",
"product": {
"name": "CPython",
"vendor": {
"name": "Python",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0734",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans CPython. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service.",
"title": "Vuln\u00e9rabilit\u00e9 dans CPython",
"vendor_advisories": [
{
"published_at": "2024-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 Python",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
]
}
CERTFR-2025-AVI-0055
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle PeopleSoft. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.60 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise CC Common Application Objects version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.61 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise SCM Purchasing version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FIN Cash Management version 9.2 | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FIN eSettlements version 9.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "PeopleSoft Enterprise PeopleTools version 8.60",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise CC Common Application Objects version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools version 8.61",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise SCM Purchasing version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FIN Cash Management version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FIN eSettlements version 9.2",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-21562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21562"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21537"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2025-21561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21561"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2025-21545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21545"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21530"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-21563",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21563"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0055",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle PeopleSoft. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle PeopleSoft",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle PeopleSoft cpujan2025",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
]
}
CERTFR-2025-AVI-0170
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 12.2.4 IF4 | ||
| IBM | QRadar | QRadar Data Synchronization versions antérieures à 3.2.1 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 iFix 02 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x sans le correctif de sécurité temporaire PH16353 ou antérieures à 9.0.5.2 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.x antérieures à 6.1.0.2 iFix 02 | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 4.x sans le dernier correctif de sécurité | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 IF2 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.0.x antérieures à 6.0.3.1 iFix 02 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.1 iFix 01 | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 5.x antérieures à 5.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 12.2.4 IF4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Data Synchronization versions ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x sans le correctif de s\u00e9curit\u00e9 temporaire PH16353 ou ant\u00e9rieures \u00e0 9.0.5.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.2 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 4.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 iFix 02",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.1 iFix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 5.x ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21536"
},
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2023-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35946"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2015-7450",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7450"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2018-19797",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19797"
},
{
"name": "CVE-2023-28523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28523"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2023-31124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2018-19827",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19827"
},
{
"name": "CVE-2018-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11694"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2022-4904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40094"
},
{
"name": "CVE-2023-24807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24807"
},
{
"name": "CVE-2025-22150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22150"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2021-35065",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35065"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2023-31147",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
},
{
"name": "CVE-2024-47764",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2024-56340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56340"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2024-45216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45216"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-28527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28527"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2019-6286",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6286"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2018-19839",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19839"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-45217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45217"
},
{
"name": "CVE-2024-38999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2018-20821",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20821"
},
{
"name": "CVE-2019-6283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6283"
},
{
"name": "CVE-2023-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35947"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30204"
},
{
"name": "CVE-2018-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20190"
},
{
"name": "CVE-2023-28526",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28526"
},
{
"name": "CVE-2023-28155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28155"
},
{
"name": "CVE-2018-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11698"
},
{
"name": "CVE-2025-0823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0823"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2020-7598",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7598"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0170",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7183676",
"url": "https://www.ibm.com/support/pages/node/7183676"
},
{
"published_at": "2019-11-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 1107105",
"url": "https://www.ibm.com/support/pages/node/1107105"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184475",
"url": "https://www.ibm.com/support/pages/node/7184475"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184474",
"url": "https://www.ibm.com/support/pages/node/7184474"
},
{
"published_at": "2025-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184092",
"url": "https://www.ibm.com/support/pages/node/7184092"
},
{
"published_at": "2025-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184217",
"url": "https://www.ibm.com/support/pages/node/7184217"
},
{
"published_at": "2025-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7184476",
"url": "https://www.ibm.com/support/pages/node/7184476"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis - Published: 2025-10-13 - Updated: 2025-10-13
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CERTFR-2025-AVI-0086
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | AIX | AIX versions 7.3.0 sans le correctif de sécurité APAR IJ50827 | ||
| IBM | VIOS | VIOS versions 3.1.3 antérieures à 3.1.3 sans le correctif de sécurité APAR IJ50828 | ||
| IBM | Sterling Connect:Direct | IBM Sterling B2B Integrator versions 6.2.0.x antérieures à 6.2.0.4 | ||
| IBM | AIX | AIX versions 7.3.2 antérieures à 7.3.1 SP02 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.0 sans les derniers correctifs de sécurité | ||
| IBM | AIX | AIX versions 7.3.1 antérieures à 7.3.1 SP04 | ||
| IBM | Sterling Connect:Direct | IBM Sterling B2B Integrator versions 6.0.x à 6.1.2.5 antérieures à 6.1.2.6 | ||
| IBM | AIX | AIX versions 7.2.x antérieures à 7.2.5 SP08 | ||
| IBM | VIOS | VIOS versions 4.1.0 antérieures à 4.1.20 | ||
| IBM | QRadar | IBM QRadar Network Packet Capture versions 7.5.0 antérieures à 7.5.0 Update Package 11 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect versions 6.1.x antérieures à 6.1.0.27 | ||
| IBM | VIOS | VIOS versions 3.1.4 antérieures à 3.1.4.40 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "AIX versions 7.3.0 sans le correctif de s\u00e9curit\u00e9 APAR IJ50827",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1.3 ant\u00e9rieures \u00e0 3.1.3 sans le correctif de s\u00e9curit\u00e9 \n APAR IJ50828",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.4",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.3.2 ant\u00e9rieures \u00e0 7.3.1 SP02",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.0 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.3.1 ant\u00e9rieures \u00e0 7.3.1 SP04",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling B2B Integrator versions 6.0.x \u00e0 6.1.2.5 ant\u00e9rieures \u00e0 6.1.2.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2.x ant\u00e9rieures \u00e0 7.2.5 SP08",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 4.1.0 ant\u00e9rieures \u00e0 4.1.20",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Packet Capture versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 Update Package 11",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.27",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1.4 ant\u00e9rieures \u00e0 3.1.4.40",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-31315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31315"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
},
{
"name": "CVE-2024-30205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
},
{
"name": "CVE-2024-30203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2023-20584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20584"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5742"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2023-31356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31356"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2022-34917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34917"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2020-27511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27511"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0086",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182001",
"url": "https://www.ibm.com/support/pages/node/7182001"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182015",
"url": "https://www.ibm.com/support/pages/node/7182015"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182000",
"url": "https://www.ibm.com/support/pages/node/7182000"
},
{
"published_at": "2025-01-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181893",
"url": "https://www.ibm.com/support/pages/node/7181893"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182042",
"url": "https://www.ibm.com/support/pages/node/7182042"
},
{
"published_at": "2025-01-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150641",
"url": "https://www.ibm.com/support/pages/node/7150641"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182056",
"url": "https://www.ibm.com/support/pages/node/7182056"
},
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182052",
"url": "https://www.ibm.com/support/pages/node/7182052"
}
]
}
CERTFR-2025-AVI-0967
Vulnerability from certfr_avis - Published: 2025-11-05 - Updated: 2025-11-05
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | File Integrity Monitoring pour VMware Tanzu Platform versions antérieures à 2.1.49 | ||
| VMware | Tanzu Platform | Cloud Service Broker pour Azure pour VMware Tanzu Platform versions antérieures à 1.13.1 | ||
| VMware | Tanzu Platform | AI Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Platform | Scheduler pour VMware Tanzu Platform versions antérieures à 2.0.21 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.4 | ||
| VMware | Tanzu Platform | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Platform | .NET Core Buildpack versions antérieures à 2.4.64 | ||
| VMware | Tanzu Platform | VMware Tanzu Data Flow sur Tanzu Platform versions antérieures à 2.0.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.4 | ||
| VMware | Tanzu Platform | CredHub Secrets Management pour VMware Tanzu Platform versions antérieures à 1.6.7 | ||
| VMware | Tanzu Platform | Extended App Support pour Tanzu Platform versions antérieures à 1.0.8 | ||
| VMware | Tanzu Platform | Go Buildpack versions antérieures à 1.10.57 | ||
| VMware | Tanzu Platform | VMware Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Platform | NodeJS Buildpack versions antérieures à 1.8.61 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.0 | ||
| VMware | Tanzu Platform | Application Services pour VMware Tanzu Platform versions antérieures à 3.3.11 | ||
| VMware | Tanzu Platform | IPsec Encryption pour VMware Tanzu Platform versions antérieures à 1.9.68 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "File Integrity Monitoring pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.1.49",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Service Broker pour Azure pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.13.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.21",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": ".NET Core Buildpack versions ant\u00e9rieures \u00e0 2.4.64",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu Data Flow sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.8",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Go Buildpack versions ant\u00e9rieures \u00e0 1.10.57",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.61",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Application Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.3.11",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "IPsec Encryption pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.9.68",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-7409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7409"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2024-6505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6505"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-43484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43484"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-54798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54798"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2024-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3447"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38229"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-43483",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43483"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-58446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58446"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3446"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-4467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4467"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2023-30584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30584"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2024-43485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43485"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2025-6242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6242"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-61620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61620"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-11-05T00:00:00",
"last_revision_date": "2025-11-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0967",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36323",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36323"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36343",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36343"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-99",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36326"
},
{
"published_at": "2025-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36305",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36305"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36345",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36345"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36329"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-81",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36316"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36331"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36334",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36334"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36335",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36335"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36340",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36340"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36319",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36319"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36339",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36339"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36322",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36322"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36321",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36321"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36324"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36336",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36336"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36318",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36318"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36337",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36337"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36346",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36346"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-81",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36315"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36317",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36317"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36344",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36344"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36341",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36341"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36314",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36314"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36330"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36332",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36332"
},
{
"published_at": "2025-11-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36304",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36304"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36342",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36342"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36333",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36333"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-99",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36327"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36338",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36338"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36328"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36325"
}
]
}
CERTFR-2024-AVI-0734
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans CPython. Elle permet à un attaquant de provoquer un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CPython versions ant\u00e9rieures \u00e0 3.13.0rc2",
"product": {
"name": "CPython",
"vendor": {
"name": "Python",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0734",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans CPython. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service.",
"title": "Vuln\u00e9rabilit\u00e9 dans CPython",
"vendor_advisories": [
{
"published_at": "2024-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 Python",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
SUSE-SU-2025:20065-1
Vulnerability from csaf_suse - Published: 2025-02-03 09:01 - Updated: 2025-02-03 09:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python311",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python311 fixes the following issues:\n\n- CVE-2024-8088: Fixed a denial of service in zipfile (bsc#1229704)\n- CVE-2024-6232: Fixed a ReDos via excessive backtracking while parsing header values (bsc#1230227)\n- CVE-2024-7592: Fixed a denial of service in the http.cookies module (bsc#1229596)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-87",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20065-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20065-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520065-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20065-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021256.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1229704",
"url": "https://bugzilla.suse.com/1229704"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
}
],
"title": "Security update for python311",
"tracking": {
"current_release_date": "2025-02-03T09:01:09Z",
"generator": {
"date": "2025-02-03T09:01:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20065-1",
"initial_release_date": "2025-02-03T09:01:09Z",
"revision_history": [
{
"date": "2025-02-03T09:01:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.8-4.1.aarch64",
"product": {
"name": "libpython3_11-1_0-3.11.8-4.1.aarch64",
"product_id": "libpython3_11-1_0-3.11.8-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-3.11.8-4.1.aarch64",
"product": {
"name": "python311-3.11.8-4.1.aarch64",
"product_id": "python311-3.11.8-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.8-4.1.aarch64",
"product": {
"name": "python311-base-3.11.8-4.1.aarch64",
"product_id": "python311-base-3.11.8-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.8-4.1.aarch64",
"product": {
"name": "python311-curses-3.11.8-4.1.aarch64",
"product_id": "python311-curses-3.11.8-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.8-4.1.s390x",
"product": {
"name": "libpython3_11-1_0-3.11.8-4.1.s390x",
"product_id": "libpython3_11-1_0-3.11.8-4.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-3.11.8-4.1.s390x",
"product": {
"name": "python311-3.11.8-4.1.s390x",
"product_id": "python311-3.11.8-4.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.8-4.1.s390x",
"product": {
"name": "python311-base-3.11.8-4.1.s390x",
"product_id": "python311-base-3.11.8-4.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.8-4.1.s390x",
"product": {
"name": "python311-curses-3.11.8-4.1.s390x",
"product_id": "python311-curses-3.11.8-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.8-4.1.x86_64",
"product": {
"name": "libpython3_11-1_0-3.11.8-4.1.x86_64",
"product_id": "libpython3_11-1_0-3.11.8-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-3.11.8-4.1.x86_64",
"product": {
"name": "python311-3.11.8-4.1.x86_64",
"product_id": "python311-3.11.8-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.8-4.1.x86_64",
"product": {
"name": "python311-base-3.11.8-4.1.x86_64",
"product_id": "python311-base-3.11.8-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.8-4.1.x86_64",
"product": {
"name": "python311-curses-3.11.8-4.1.x86_64",
"product_id": "python311-curses-3.11.8-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.8-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.8-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.8-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.8-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.8-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.8-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.8-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64"
},
"product_reference": "python311-3.11.8-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.8-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x"
},
"product_reference": "python311-3.11.8-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.8-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64"
},
"product_reference": "python311-3.11.8-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.8-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64"
},
"product_reference": "python311-base-3.11.8-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.8-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x"
},
"product_reference": "python311-base-3.11.8-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.8-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64"
},
"product_reference": "python311-base-3.11.8-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.8-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64"
},
"product_reference": "python311-curses-3.11.8-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.8-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x"
},
"product_reference": "python311-curses-3.11.8-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.8-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
},
"product_reference": "python311-curses-3.11.8-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T09:01:09Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T09:01:09Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.8-4.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.8-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T09:01:09Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
}
]
}
SUSE-SU-2024:3357-1
Vulnerability from csaf_suse - Published: 2024-09-20 15:13 - Updated: 2024-09-20 15:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python310",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python310 fixes the following issues:\n\n- Update to version 3.10.15\n- CVE-2024-8088: Fixed denial of service in zipfile. (bsc#1229704) \n- CVE-2024-7592: Fixed uncontrolled CPU resource consumption when in http.cookies module. (bsc#1229596)\n- CVE-2024-6232: Fixed ReDos via excessive backtracking while parsing header values. (bsc#1230227)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3357,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3357,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3357,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3357,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3357,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3357,openSUSE-SLE-15.5-2024-3357,openSUSE-SLE-15.6-2024-3357",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3357-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3357-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243357-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3357-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019483.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1229704",
"url": "https://bugzilla.suse.com/1229704"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
}
],
"title": "Security update for python310",
"tracking": {
"current_release_date": "2024-09-20T15:13:09Z",
"generator": {
"date": "2024-09-20T15:13:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3357-1",
"initial_release_date": "2024-09-20T15:13:09Z",
"revision_history": [
{
"date": "2024-09-20T15:13:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"product_id": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-base-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-base-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-base-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-curses-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-curses-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-dbm-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-dbm-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-devel-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-devel-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-devel-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-doc-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-doc-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-doc-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-idle-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-idle-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-testsuite-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-tk-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-tk-3.10.15-150400.4.57.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-tools-3.10.15-150400.4.57.1.aarch64",
"product": {
"name": "python310-tools-3.10.15-150400.4.57.1.aarch64",
"product_id": "python310-tools-3.10.15-150400.4.57.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_10-1_0-64bit-3.10.15-150400.4.57.1.aarch64_ilp32",
"product": {
"name": "libpython3_10-1_0-64bit-3.10.15-150400.4.57.1.aarch64_ilp32",
"product_id": "libpython3_10-1_0-64bit-3.10.15-150400.4.57.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python310-64bit-3.10.15-150400.4.57.1.aarch64_ilp32",
"product": {
"name": "python310-64bit-3.10.15-150400.4.57.1.aarch64_ilp32",
"product_id": "python310-64bit-3.10.15-150400.4.57.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python310-base-64bit-3.10.15-150400.4.57.1.aarch64_ilp32",
"product": {
"name": "python310-base-64bit-3.10.15-150400.4.57.1.aarch64_ilp32",
"product_id": "python310-base-64bit-3.10.15-150400.4.57.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.i586",
"product": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.i586",
"product_id": "libpython3_10-1_0-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-3.10.15-150400.4.57.1.i586",
"product_id": "python310-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-base-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-base-3.10.15-150400.4.57.1.i586",
"product_id": "python310-base-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-curses-3.10.15-150400.4.57.1.i586",
"product_id": "python310-curses-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-dbm-3.10.15-150400.4.57.1.i586",
"product_id": "python310-dbm-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-devel-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-devel-3.10.15-150400.4.57.1.i586",
"product_id": "python310-devel-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-doc-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-doc-3.10.15-150400.4.57.1.i586",
"product_id": "python310-doc-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.i586",
"product_id": "python310-doc-devhelp-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-idle-3.10.15-150400.4.57.1.i586",
"product_id": "python310-idle-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-testsuite-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.i586",
"product_id": "python310-testsuite-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-tk-3.10.15-150400.4.57.1.i586",
"product_id": "python310-tk-3.10.15-150400.4.57.1.i586"
}
},
{
"category": "product_version",
"name": "python310-tools-3.10.15-150400.4.57.1.i586",
"product": {
"name": "python310-tools-3.10.15-150400.4.57.1.i586",
"product_id": "python310-tools-3.10.15-150400.4.57.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"product_id": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-base-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-base-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-base-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-curses-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-curses-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-dbm-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-devel-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-devel-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-devel-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-doc-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-doc-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-doc-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-idle-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-idle-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-testsuite-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-tk-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-tk-3.10.15-150400.4.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-tools-3.10.15-150400.4.57.1.ppc64le",
"product": {
"name": "python310-tools-3.10.15-150400.4.57.1.ppc64le",
"product_id": "python310-tools-3.10.15-150400.4.57.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"product_id": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-base-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-base-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-base-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-curses-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-curses-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-dbm-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-dbm-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-devel-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-devel-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-devel-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-doc-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-doc-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-doc-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-doc-devhelp-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-idle-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-idle-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-testsuite-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-testsuite-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-tk-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-tk-3.10.15-150400.4.57.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-tools-3.10.15-150400.4.57.1.s390x",
"product": {
"name": "python310-tools-3.10.15-150400.4.57.1.s390x",
"product_id": "python310-tools-3.10.15-150400.4.57.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"product_id": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"product_id": "libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-32bit-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-32bit-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-base-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-base-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-base-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-base-32bit-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-curses-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-curses-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-dbm-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-dbm-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-devel-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-devel-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-devel-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-doc-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-doc-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-doc-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-idle-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-idle-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-testsuite-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-tk-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-tk-3.10.15-150400.4.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-tools-3.10.15-150400.4.57.1.x86_64",
"product": {
"name": "python310-tools-3.10.15-150400.4.57.1.x86_64",
"product_id": "python310-tools-3.10.15-150400.4.57.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-32bit-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-32bit-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-doc-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-doc-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-doc-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-doc-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-testsuite-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-32bit-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-base-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-base-32bit-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-curses-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-dbm-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-devel-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-devel-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-doc-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-doc-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-doc-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-doc-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-idle-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-testsuite-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-testsuite-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tk-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tools-3.10.15-150400.4.57.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
},
"product_reference": "python310-tools-3.10.15-150400.4.57.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-20T15:13:09Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-20T15:13:09Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python310-tools-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-base-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-curses-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-devel-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-idle-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tk-3.10.15-150400.4.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.5:python310-tools-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:libpython3_10-1_0-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:libpython3_10-1_0-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-base-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-base-32bit-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-curses-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-dbm-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-devel-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-doc-devhelp-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-idle-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-testsuite-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tk-3.10.15-150400.4.57.1.x86_64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.aarch64",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.ppc64le",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.s390x",
"openSUSE Leap 15.6:python310-tools-3.10.15-150400.4.57.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-20T15:13:09Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
}
]
}
SUSE-SU-2024:3430-1
Vulnerability from csaf_suse - Published: 2024-09-24 16:46 - Updated: 2024-09-24 16:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python36",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python36 fixes the following issues:\n\n- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3430,SUSE-SLE-SDK-12-SP5-2024-3430,SUSE-SLE-SERVER-12-SP5-2024-3430",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3430-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3430-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243430-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3430-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019513.html"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
}
],
"title": "Security update for python36",
"tracking": {
"current_release_date": "2024-09-24T16:46:51Z",
"generator": {
"date": "2024-09-24T16:46:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3430-1",
"initial_release_date": "2024-09-24T16:46:51Z",
"revision_history": [
{
"date": "2024-09-24T16:46:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-67.1.aarch64",
"product": {
"name": "libpython3_6m1_0-3.6.15-67.1.aarch64",
"product_id": "libpython3_6m1_0-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-3.6.15-67.1.aarch64",
"product": {
"name": "python36-3.6.15-67.1.aarch64",
"product_id": "python36-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-base-3.6.15-67.1.aarch64",
"product": {
"name": "python36-base-3.6.15-67.1.aarch64",
"product_id": "python36-base-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-67.1.aarch64",
"product": {
"name": "python36-curses-3.6.15-67.1.aarch64",
"product_id": "python36-curses-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-67.1.aarch64",
"product": {
"name": "python36-dbm-3.6.15-67.1.aarch64",
"product_id": "python36-dbm-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-devel-3.6.15-67.1.aarch64",
"product": {
"name": "python36-devel-3.6.15-67.1.aarch64",
"product_id": "python36-devel-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-67.1.aarch64",
"product": {
"name": "python36-idle-3.6.15-67.1.aarch64",
"product_id": "python36-idle-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-testsuite-3.6.15-67.1.aarch64",
"product": {
"name": "python36-testsuite-3.6.15-67.1.aarch64",
"product_id": "python36-testsuite-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-67.1.aarch64",
"product": {
"name": "python36-tk-3.6.15-67.1.aarch64",
"product_id": "python36-tk-3.6.15-67.1.aarch64"
}
},
{
"category": "product_version",
"name": "python36-tools-3.6.15-67.1.aarch64",
"product": {
"name": "python36-tools-3.6.15-67.1.aarch64",
"product_id": "python36-tools-3.6.15-67.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-64bit-3.6.15-67.1.aarch64_ilp32",
"product": {
"name": "libpython3_6m1_0-64bit-3.6.15-67.1.aarch64_ilp32",
"product_id": "libpython3_6m1_0-64bit-3.6.15-67.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python36-64bit-3.6.15-67.1.aarch64_ilp32",
"product": {
"name": "python36-64bit-3.6.15-67.1.aarch64_ilp32",
"product_id": "python36-64bit-3.6.15-67.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python36-base-64bit-3.6.15-67.1.aarch64_ilp32",
"product": {
"name": "python36-base-64bit-3.6.15-67.1.aarch64_ilp32",
"product_id": "python36-base-64bit-3.6.15-67.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-67.1.i586",
"product": {
"name": "libpython3_6m1_0-3.6.15-67.1.i586",
"product_id": "libpython3_6m1_0-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-3.6.15-67.1.i586",
"product": {
"name": "python36-3.6.15-67.1.i586",
"product_id": "python36-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-base-3.6.15-67.1.i586",
"product": {
"name": "python36-base-3.6.15-67.1.i586",
"product_id": "python36-base-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-67.1.i586",
"product": {
"name": "python36-curses-3.6.15-67.1.i586",
"product_id": "python36-curses-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-67.1.i586",
"product": {
"name": "python36-dbm-3.6.15-67.1.i586",
"product_id": "python36-dbm-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-devel-3.6.15-67.1.i586",
"product": {
"name": "python36-devel-3.6.15-67.1.i586",
"product_id": "python36-devel-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-67.1.i586",
"product": {
"name": "python36-idle-3.6.15-67.1.i586",
"product_id": "python36-idle-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-testsuite-3.6.15-67.1.i586",
"product": {
"name": "python36-testsuite-3.6.15-67.1.i586",
"product_id": "python36-testsuite-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-67.1.i586",
"product": {
"name": "python36-tk-3.6.15-67.1.i586",
"product_id": "python36-tk-3.6.15-67.1.i586"
}
},
{
"category": "product_version",
"name": "python36-tools-3.6.15-67.1.i586",
"product": {
"name": "python36-tools-3.6.15-67.1.i586",
"product_id": "python36-tools-3.6.15-67.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-67.1.ppc64le",
"product": {
"name": "libpython3_6m1_0-3.6.15-67.1.ppc64le",
"product_id": "libpython3_6m1_0-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-3.6.15-67.1.ppc64le",
"product_id": "python36-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-base-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-base-3.6.15-67.1.ppc64le",
"product_id": "python36-base-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-curses-3.6.15-67.1.ppc64le",
"product_id": "python36-curses-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-dbm-3.6.15-67.1.ppc64le",
"product_id": "python36-dbm-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-devel-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-devel-3.6.15-67.1.ppc64le",
"product_id": "python36-devel-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-idle-3.6.15-67.1.ppc64le",
"product_id": "python36-idle-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-testsuite-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-testsuite-3.6.15-67.1.ppc64le",
"product_id": "python36-testsuite-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-tk-3.6.15-67.1.ppc64le",
"product_id": "python36-tk-3.6.15-67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-tools-3.6.15-67.1.ppc64le",
"product": {
"name": "python36-tools-3.6.15-67.1.ppc64le",
"product_id": "python36-tools-3.6.15-67.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-67.1.s390",
"product": {
"name": "libpython3_6m1_0-3.6.15-67.1.s390",
"product_id": "libpython3_6m1_0-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-3.6.15-67.1.s390",
"product": {
"name": "python36-3.6.15-67.1.s390",
"product_id": "python36-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-base-3.6.15-67.1.s390",
"product": {
"name": "python36-base-3.6.15-67.1.s390",
"product_id": "python36-base-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-67.1.s390",
"product": {
"name": "python36-curses-3.6.15-67.1.s390",
"product_id": "python36-curses-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-67.1.s390",
"product": {
"name": "python36-dbm-3.6.15-67.1.s390",
"product_id": "python36-dbm-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-devel-3.6.15-67.1.s390",
"product": {
"name": "python36-devel-3.6.15-67.1.s390",
"product_id": "python36-devel-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-67.1.s390",
"product": {
"name": "python36-idle-3.6.15-67.1.s390",
"product_id": "python36-idle-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-testsuite-3.6.15-67.1.s390",
"product": {
"name": "python36-testsuite-3.6.15-67.1.s390",
"product_id": "python36-testsuite-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-67.1.s390",
"product": {
"name": "python36-tk-3.6.15-67.1.s390",
"product_id": "python36-tk-3.6.15-67.1.s390"
}
},
{
"category": "product_version",
"name": "python36-tools-3.6.15-67.1.s390",
"product": {
"name": "python36-tools-3.6.15-67.1.s390",
"product_id": "python36-tools-3.6.15-67.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-67.1.s390x",
"product": {
"name": "libpython3_6m1_0-3.6.15-67.1.s390x",
"product_id": "libpython3_6m1_0-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"product": {
"name": "libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"product_id": "libpython3_6m1_0-32bit-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-3.6.15-67.1.s390x",
"product": {
"name": "python36-3.6.15-67.1.s390x",
"product_id": "python36-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-32bit-3.6.15-67.1.s390x",
"product": {
"name": "python36-32bit-3.6.15-67.1.s390x",
"product_id": "python36-32bit-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-base-3.6.15-67.1.s390x",
"product": {
"name": "python36-base-3.6.15-67.1.s390x",
"product_id": "python36-base-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-base-32bit-3.6.15-67.1.s390x",
"product": {
"name": "python36-base-32bit-3.6.15-67.1.s390x",
"product_id": "python36-base-32bit-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-67.1.s390x",
"product": {
"name": "python36-curses-3.6.15-67.1.s390x",
"product_id": "python36-curses-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-67.1.s390x",
"product": {
"name": "python36-dbm-3.6.15-67.1.s390x",
"product_id": "python36-dbm-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-devel-3.6.15-67.1.s390x",
"product": {
"name": "python36-devel-3.6.15-67.1.s390x",
"product_id": "python36-devel-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-67.1.s390x",
"product": {
"name": "python36-idle-3.6.15-67.1.s390x",
"product_id": "python36-idle-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-testsuite-3.6.15-67.1.s390x",
"product": {
"name": "python36-testsuite-3.6.15-67.1.s390x",
"product_id": "python36-testsuite-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-67.1.s390x",
"product": {
"name": "python36-tk-3.6.15-67.1.s390x",
"product_id": "python36-tk-3.6.15-67.1.s390x"
}
},
{
"category": "product_version",
"name": "python36-tools-3.6.15-67.1.s390x",
"product": {
"name": "python36-tools-3.6.15-67.1.s390x",
"product_id": "python36-tools-3.6.15-67.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-67.1.x86_64",
"product": {
"name": "libpython3_6m1_0-3.6.15-67.1.x86_64",
"product_id": "libpython3_6m1_0-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"product": {
"name": "libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"product_id": "libpython3_6m1_0-32bit-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-3.6.15-67.1.x86_64",
"product": {
"name": "python36-3.6.15-67.1.x86_64",
"product_id": "python36-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-32bit-3.6.15-67.1.x86_64",
"product": {
"name": "python36-32bit-3.6.15-67.1.x86_64",
"product_id": "python36-32bit-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-base-3.6.15-67.1.x86_64",
"product": {
"name": "python36-base-3.6.15-67.1.x86_64",
"product_id": "python36-base-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-base-32bit-3.6.15-67.1.x86_64",
"product": {
"name": "python36-base-32bit-3.6.15-67.1.x86_64",
"product_id": "python36-base-32bit-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-curses-3.6.15-67.1.x86_64",
"product": {
"name": "python36-curses-3.6.15-67.1.x86_64",
"product_id": "python36-curses-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-dbm-3.6.15-67.1.x86_64",
"product": {
"name": "python36-dbm-3.6.15-67.1.x86_64",
"product_id": "python36-dbm-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-devel-3.6.15-67.1.x86_64",
"product": {
"name": "python36-devel-3.6.15-67.1.x86_64",
"product_id": "python36-devel-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-idle-3.6.15-67.1.x86_64",
"product": {
"name": "python36-idle-3.6.15-67.1.x86_64",
"product_id": "python36-idle-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-testsuite-3.6.15-67.1.x86_64",
"product": {
"name": "python36-testsuite-3.6.15-67.1.x86_64",
"product_id": "python36-testsuite-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-tk-3.6.15-67.1.x86_64",
"product": {
"name": "python36-tk-3.6.15-67.1.x86_64",
"product_id": "python36-tk-3.6.15-67.1.x86_64"
}
},
{
"category": "product_version",
"name": "python36-tools-3.6.15-67.1.x86_64",
"product": {
"name": "python36-tools-3.6.15-67.1.x86_64",
"product_id": "python36-tools-3.6.15-67.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-devel-3.6.15-67.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.aarch64"
},
"product_reference": "python36-devel-3.6.15-67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-devel-3.6.15-67.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.ppc64le"
},
"product_reference": "python36-devel-3.6.15-67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-devel-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.s390x"
},
"product_reference": "python36-devel-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-devel-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.x86_64"
},
"product_reference": "python36-devel-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-67.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-67.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-32bit-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.s390x"
},
"product_reference": "libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-32bit-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.x86_64"
},
"product_reference": "libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-67.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.aarch64"
},
"product_reference": "python36-3.6.15-67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-67.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.ppc64le"
},
"product_reference": "python36-3.6.15-67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.s390x"
},
"product_reference": "python36-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.x86_64"
},
"product_reference": "python36-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-base-3.6.15-67.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.aarch64"
},
"product_reference": "python36-base-3.6.15-67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-base-3.6.15-67.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.ppc64le"
},
"product_reference": "python36-base-3.6.15-67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-base-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.s390x"
},
"product_reference": "python36-base-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-base-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.x86_64"
},
"product_reference": "python36-base-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-67.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-67.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-32bit-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.s390x"
},
"product_reference": "libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-32bit-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.x86_64"
},
"product_reference": "libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-67.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.aarch64"
},
"product_reference": "python36-3.6.15-67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-67.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.ppc64le"
},
"product_reference": "python36-3.6.15-67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.s390x"
},
"product_reference": "python36-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.x86_64"
},
"product_reference": "python36-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-base-3.6.15-67.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.aarch64"
},
"product_reference": "python36-base-3.6.15-67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-base-3.6.15-67.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.ppc64le"
},
"product_reference": "python36-base-3.6.15-67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-base-3.6.15-67.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.s390x"
},
"product_reference": "python36-base-3.6.15-67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-base-3.6.15-67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.x86_64"
},
"product_reference": "python36-base-3.6.15-67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python36-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python36-base-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_6m1_0-32bit-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36-base-3.6.15-67.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python36-devel-3.6.15-67.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T16:46:51Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
}
]
}
SUSE-SU-2024:3303-1
Vulnerability from csaf_suse - Published: 2024-09-18 12:52 - Updated: 2024-09-18 12:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python312",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python312 fixes the following issues:\n\n- Update to 3.12.6\n- CVE-2024-6923: Fixed uncontrolled CPU resource consumption when in http.cookies module. (bsc#1228780).\n- CVE-2024-7592: Fixed Email header injection due to unquoted newlines. (bsc#1229596) \n- CVE-2024-6232: Fixed ReDos via excessive backtracking while parsing header values. (bsc#1230227)\n- CVE-2024-8088: Fixed denial of service in zipfile. (bsc#1229704)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3303,SUSE-SLE-Module-Python3-15-SP6-2024-3303,openSUSE-SLE-15.6-2024-3303",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3303-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3303-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243303-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3303-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-September/036952.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227999",
"url": "https://bugzilla.suse.com/1227999"
},
{
"category": "self",
"summary": "SUSE Bug 1228780",
"url": "https://bugzilla.suse.com/1228780"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1229704",
"url": "https://bugzilla.suse.com/1229704"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
}
],
"title": "Security update for python312",
"tracking": {
"current_release_date": "2024-09-18T12:52:26Z",
"generator": {
"date": "2024-09-18T12:52:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3303-1",
"initial_release_date": "2024-09-18T12:52:26Z",
"revision_history": [
{
"date": "2024-09-18T12:52:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"product_id": "libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-base-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-base-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-base-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-curses-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-curses-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-dbm-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-dbm-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-devel-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-devel-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-devel-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-doc-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-doc-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-doc-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-idle-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-idle-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-testsuite-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-tk-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-tk-3.12.6-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-tools-3.12.6-150600.3.6.1.aarch64",
"product": {
"name": "python312-tools-3.12.6-150600.3.6.1.aarch64",
"product_id": "python312-tools-3.12.6-150600.3.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_12-1_0-64bit-3.12.6-150600.3.6.1.aarch64_ilp32",
"product": {
"name": "libpython3_12-1_0-64bit-3.12.6-150600.3.6.1.aarch64_ilp32",
"product_id": "libpython3_12-1_0-64bit-3.12.6-150600.3.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python312-64bit-3.12.6-150600.3.6.1.aarch64_ilp32",
"product": {
"name": "python312-64bit-3.12.6-150600.3.6.1.aarch64_ilp32",
"product_id": "python312-64bit-3.12.6-150600.3.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python312-base-64bit-3.12.6-150600.3.6.1.aarch64_ilp32",
"product": {
"name": "python312-base-64bit-3.12.6-150600.3.6.1.aarch64_ilp32",
"product_id": "python312-base-64bit-3.12.6-150600.3.6.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.i586",
"product": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.i586",
"product_id": "libpython3_12-1_0-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-3.12.6-150600.3.6.1.i586",
"product_id": "python312-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-base-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-base-3.12.6-150600.3.6.1.i586",
"product_id": "python312-base-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-curses-3.12.6-150600.3.6.1.i586",
"product_id": "python312-curses-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-dbm-3.12.6-150600.3.6.1.i586",
"product_id": "python312-dbm-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-devel-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-devel-3.12.6-150600.3.6.1.i586",
"product_id": "python312-devel-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-doc-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-doc-3.12.6-150600.3.6.1.i586",
"product_id": "python312-doc-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.i586",
"product_id": "python312-doc-devhelp-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-idle-3.12.6-150600.3.6.1.i586",
"product_id": "python312-idle-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-testsuite-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.i586",
"product_id": "python312-testsuite-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-tk-3.12.6-150600.3.6.1.i586",
"product_id": "python312-tk-3.12.6-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python312-tools-3.12.6-150600.3.6.1.i586",
"product": {
"name": "python312-tools-3.12.6-150600.3.6.1.i586",
"product_id": "python312-tools-3.12.6-150600.3.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"product_id": "libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-base-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-base-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-base-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-curses-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-curses-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-dbm-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-devel-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-devel-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-devel-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-doc-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-doc-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-doc-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-idle-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-idle-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-testsuite-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-tk-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-tk-3.12.6-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-tools-3.12.6-150600.3.6.1.ppc64le",
"product": {
"name": "python312-tools-3.12.6-150600.3.6.1.ppc64le",
"product_id": "python312-tools-3.12.6-150600.3.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"product_id": "libpython3_12-1_0-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-base-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-base-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-base-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-curses-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-curses-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-dbm-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-dbm-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-devel-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-devel-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-devel-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-doc-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-doc-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-doc-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-doc-devhelp-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-idle-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-idle-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-testsuite-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-testsuite-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-tk-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-tk-3.12.6-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-tools-3.12.6-150600.3.6.1.s390x",
"product": {
"name": "python312-tools-3.12.6-150600.3.6.1.s390x",
"product_id": "python312-tools-3.12.6-150600.3.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"product_id": "libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"product_id": "libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-32bit-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-32bit-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-32bit-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-base-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-base-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-base-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-base-32bit-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-curses-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-curses-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-dbm-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-dbm-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-devel-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-devel-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-devel-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-doc-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-doc-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-doc-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-idle-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-idle-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-testsuite-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-tk-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-tk-3.12.6-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-tools-3.12.6-150600.3.6.1.x86_64",
"product": {
"name": "python312-tools-3.12.6-150600.3.6.1.x86_64",
"product_id": "python312-tools-3.12.6-150600.3.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-base-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-base-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-base-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-base-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-curses-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-curses-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-curses-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-curses-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-dbm-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-dbm-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-dbm-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-devel-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-devel-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-devel-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-devel-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-devel-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-devel-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-devel-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-devel-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-idle-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-idle-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-idle-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-idle-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-tk-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-tk-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-tk-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-tk-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tools-3.12.6-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-tools-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tools-3.12.6-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-tools-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tools-3.12.6-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-tools-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tools-3.12.6-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-tools-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-32bit-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-32bit-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-base-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-base-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-base-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-base-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-base-32bit-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-curses-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-curses-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-curses-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-curses-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-dbm-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-dbm-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-dbm-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-devel-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-devel-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-devel-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-devel-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-devel-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-devel-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-devel-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-devel-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-doc-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-doc-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-doc-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-doc-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-doc-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-doc-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-doc-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-doc-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-idle-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-idle-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-idle-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-idle-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-testsuite-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-testsuite-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-tk-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-tk-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-tk-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-tk-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tools-3.12.6-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64"
},
"product_reference": "python312-tools-3.12.6-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tools-3.12.6-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le"
},
"product_reference": "python312-tools-3.12.6-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tools-3.12.6-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x"
},
"product_reference": "python312-tools-3.12.6-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tools-3.12.6-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
},
"product_reference": "python312-tools-3.12.6-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T12:52:26Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6923"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u0027t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6923",
"url": "https://www.suse.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "SUSE Bug 1228780 for CVE-2024-6923",
"url": "https://bugzilla.suse.com/1228780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T12:52:26Z",
"details": "important"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T12:52:26Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-base-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python312-tools-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_12-1_0-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_12-1_0-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-base-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-base-32bit-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-curses-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-dbm-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-devel-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-doc-devhelp-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-idle-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-testsuite-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tk-3.12.6-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python312-tools-3.12.6-150600.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T12:52:26Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
}
]
}
SUSE-SU-2024:3470-1
Vulnerability from csaf_suse - Published: 2024-09-27 12:35 - Updated: 2024-09-27 12:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python3 fixes the following issues:\n\n- CVE-2024-6923: Fixed uncontrolled CPU resource consumption when in http.cookies module (bsc#1228780).\n- CVE-2024-5642: Fixed buffer overread when NPN is used and invalid values are sent to the OpenSSL API (bsc#1227233).\n- CVE-2024-7592: Fixed Email header injection due to unquoted newlines (bsc#1229596).\n- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)\n\nBug fixes:\n\n- %{profileopt} variable is set according to the variable %{do_profiling} (bsc#1227999).\n- Stop using %%defattr, it seems to be breaking proper executable attributes on /usr/bin/ scripts (bsc#1227378).\n- Remove %suse_update_desktop_file macro as it is not useful any more.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3470,SUSE-SLE-Micro-5.3-2024-3470,SUSE-SLE-Micro-5.4-2024-3470,SUSE-SLE-Micro-5.5-2024-3470,SUSE-SLE-Module-Basesystem-15-SP5-2024-3470,SUSE-SLE-Module-Basesystem-15-SP6-2024-3470,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3470,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3470,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3470,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3470,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3470,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3470,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3470,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3470,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3470,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3470,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3470,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3470,SUSE-SUSE-MicroOS-5.2-2024-3470,SUSE-Storage-7.1-2024-3470,openSUSE-Leap-Micro-5.5-2024-3470,openSUSE-SLE-15.5-2024-3470,openSUSE-SLE-15.6-2024-3470",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3470-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3470-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243470-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3470-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227233",
"url": "https://bugzilla.suse.com/1227233"
},
{
"category": "self",
"summary": "SUSE Bug 1227378",
"url": "https://bugzilla.suse.com/1227378"
},
{
"category": "self",
"summary": "SUSE Bug 1227999",
"url": "https://bugzilla.suse.com/1227999"
},
{
"category": "self",
"summary": "SUSE Bug 1228780",
"url": "https://bugzilla.suse.com/1228780"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5642 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5642/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
}
],
"title": "Security update for python3",
"tracking": {
"current_release_date": "2024-09-27T12:35:59Z",
"generator": {
"date": "2024-09-27T12:35:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3470-1",
"initial_release_date": "2024-09-27T12:35:59Z",
"revision_history": [
{
"date": "2024-09-27T12:35:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"product_id": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-base-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-curses-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-dbm-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-devel-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-doc-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-doc-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-idle-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-testsuite-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-tk-3.6.15-150300.10.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"product": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"product_id": "python3-tools-3.6.15-150300.10.72.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-64bit-3.6.15-150300.10.72.1.aarch64_ilp32",
"product": {
"name": "libpython3_6m1_0-64bit-3.6.15-150300.10.72.1.aarch64_ilp32",
"product_id": "libpython3_6m1_0-64bit-3.6.15-150300.10.72.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.i586",
"product": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.i586",
"product_id": "libpython3_6m1_0-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-3.6.15-150300.10.72.1.i586",
"product_id": "python3-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-base-3.6.15-150300.10.72.1.i586",
"product_id": "python3-base-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-curses-3.6.15-150300.10.72.1.i586",
"product_id": "python3-curses-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-dbm-3.6.15-150300.10.72.1.i586",
"product_id": "python3-dbm-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-devel-3.6.15-150300.10.72.1.i586",
"product_id": "python3-devel-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-doc-3.6.15-150300.10.72.1.i586",
"product_id": "python3-doc-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.i586",
"product_id": "python3-doc-devhelp-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-idle-3.6.15-150300.10.72.1.i586",
"product_id": "python3-idle-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.i586",
"product_id": "python3-testsuite-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-tk-3.6.15-150300.10.72.1.i586",
"product_id": "python3-tk-3.6.15-150300.10.72.1.i586"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150300.10.72.1.i586",
"product": {
"name": "python3-tools-3.6.15-150300.10.72.1.i586",
"product_id": "python3-tools-3.6.15-150300.10.72.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"product_id": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-base-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-curses-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-dbm-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-devel-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-doc-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-doc-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-idle-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-testsuite-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-tk-3.6.15-150300.10.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"product": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"product_id": "python3-tools-3.6.15-150300.10.72.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"product_id": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-base-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-curses-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-curses-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-dbm-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-devel-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-devel-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-doc-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-doc-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-doc-devhelp-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-idle-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-idle-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-testsuite-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-tk-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-tk-3.6.15-150300.10.72.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150300.10.72.1.s390x",
"product": {
"name": "python3-tools-3.6.15-150300.10.72.1.s390x",
"product_id": "python3-tools-3.6.15-150300.10.72.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"product_id": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"product_id": "libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-base-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-curses-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-dbm-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-devel-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-doc-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-doc-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-idle-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-testsuite-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-tk-3.6.15-150300.10.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"product": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"product_id": "python3-tools-3.6.15-150300.10.72.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.5",
"product": {
"name": "openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-doc-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-doc-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-doc-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-doc-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-testsuite-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-doc-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-doc-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-doc-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-doc-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-testsuite-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-testsuite-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150300.10.72.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150300.10.72.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5642",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5642"
}
],
"notes": [
{
"category": "general",
"text": "CPython 3.9 and earlier doesn\u0027t disallow configuring an empty list (\"[]\") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5642",
"url": "https://www.suse.com/security/cve/CVE-2024-5642"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5642",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T12:35:59Z",
"details": "moderate"
}
],
"title": "CVE-2024-5642"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T12:35:59Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6923"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u0027t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6923",
"url": "https://www.suse.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "SUSE Bug 1228780 for CVE-2024-6923",
"url": "https://bugzilla.suse.com/1228780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T12:35:59Z",
"details": "important"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Enterprise Storage 7.1:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-tools-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Proxy 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-base-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-curses-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-devel-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-idle-3.6.15-150300.10.72.1.x86_64",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.s390x",
"SUSE Manager Server 4.3:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.5:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:libpython3_6m1_0-32bit-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-base-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-curses-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-dbm-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-devel-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-doc-devhelp-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-idle-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-testsuite-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tk-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.ppc64le",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap 15.6:python3-tools-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:libpython3_6m1_0-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-3.6.15-150300.10.72.1.x86_64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.aarch64",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.s390x",
"openSUSE Leap Micro 5.5:python3-base-3.6.15-150300.10.72.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T12:35:59Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
}
]
}
SUSE-SU-2024:3427-1
Vulnerability from csaf_suse - Published: 2024-09-24 16:42 - Updated: 2024-09-24 16:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python311",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python311 fixes the following issues:\n\nUpdate python311 to version 3.11.10.\n\n- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)\n- CVE-2024-7592: quadratic algorithm used when parsing cookies leads to excessive resource consumption. (bsc#1229596)\n- CVE-2024-8088: lack of name validation when extracting a zip archive leads to infinite loops. (bsc#1229704)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3427,SUSE-SLE-Module-Basesystem-15-SP6-2024-3427,SUSE-SLE-Module-Python3-15-SP6-2024-3427,openSUSE-SLE-15.6-2024-3427",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3427-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3427-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243427-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3427-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019516.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1229704",
"url": "https://bugzilla.suse.com/1229704"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
}
],
"title": "Security update for python311",
"tracking": {
"current_release_date": "2024-09-24T16:42:50Z",
"generator": {
"date": "2024-09-24T16:42:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3427-1",
"initial_release_date": "2024-09-24T16:42:50Z",
"revision_history": [
{
"date": "2024-09-24T16:42:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"product_id": "libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-base-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-base-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-curses-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-curses-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-dbm-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-dbm-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-devel-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-devel-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-doc-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-doc-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-idle-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-idle-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-testsuite-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-tk-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-tk-3.11.10-150600.3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150600.3.6.1.aarch64",
"product": {
"name": "python311-tools-3.11.10-150600.3.6.1.aarch64",
"product_id": "python311-tools-3.11.10-150600.3.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-64bit-3.11.10-150600.3.6.1.aarch64_ilp32",
"product": {
"name": "libpython3_11-1_0-64bit-3.11.10-150600.3.6.1.aarch64_ilp32",
"product_id": "libpython3_11-1_0-64bit-3.11.10-150600.3.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python311-64bit-3.11.10-150600.3.6.1.aarch64_ilp32",
"product": {
"name": "python311-64bit-3.11.10-150600.3.6.1.aarch64_ilp32",
"product_id": "python311-64bit-3.11.10-150600.3.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python311-base-64bit-3.11.10-150600.3.6.1.aarch64_ilp32",
"product": {
"name": "python311-base-64bit-3.11.10-150600.3.6.1.aarch64_ilp32",
"product_id": "python311-base-64bit-3.11.10-150600.3.6.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.i586",
"product": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.i586",
"product_id": "libpython3_11-1_0-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-3.11.10-150600.3.6.1.i586",
"product_id": "python311-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-base-3.11.10-150600.3.6.1.i586",
"product_id": "python311-base-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-curses-3.11.10-150600.3.6.1.i586",
"product_id": "python311-curses-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-dbm-3.11.10-150600.3.6.1.i586",
"product_id": "python311-dbm-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-devel-3.11.10-150600.3.6.1.i586",
"product_id": "python311-devel-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-doc-3.11.10-150600.3.6.1.i586",
"product_id": "python311-doc-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.i586",
"product_id": "python311-doc-devhelp-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-idle-3.11.10-150600.3.6.1.i586",
"product_id": "python311-idle-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.i586",
"product_id": "python311-testsuite-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-tk-3.11.10-150600.3.6.1.i586",
"product_id": "python311-tk-3.11.10-150600.3.6.1.i586"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150600.3.6.1.i586",
"product": {
"name": "python311-tools-3.11.10-150600.3.6.1.i586",
"product_id": "python311-tools-3.11.10-150600.3.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"product_id": "libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-base-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-base-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-curses-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-curses-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-dbm-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-devel-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-devel-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-doc-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-doc-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-idle-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-idle-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-testsuite-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-tk-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-tk-3.11.10-150600.3.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150600.3.6.1.ppc64le",
"product": {
"name": "python311-tools-3.11.10-150600.3.6.1.ppc64le",
"product_id": "python311-tools-3.11.10-150600.3.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"product_id": "libpython3_11-1_0-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-base-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-base-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-curses-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-curses-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-dbm-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-dbm-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-devel-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-devel-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-doc-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-doc-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-doc-devhelp-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-idle-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-idle-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-testsuite-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-tk-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-tk-3.11.10-150600.3.6.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150600.3.6.1.s390x",
"product": {
"name": "python311-tools-3.11.10-150600.3.6.1.s390x",
"product_id": "python311-tools-3.11.10-150600.3.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"product_id": "libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"product_id": "libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-32bit-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-32bit-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-base-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-base-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-base-32bit-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-curses-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-curses-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-dbm-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-dbm-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-devel-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-devel-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-doc-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-doc-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-idle-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-idle-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-testsuite-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-tk-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-tk-3.11.10-150600.3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150600.3.6.1.x86_64",
"product": {
"name": "python311-tools-3.11.10-150600.3.6.1.x86_64",
"product_id": "python311-tools-3.11.10-150600.3.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-base-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-base-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-base-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-curses-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-curses-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-curses-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-curses-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-dbm-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-dbm-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-dbm-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-devel-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-devel-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-devel-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-devel-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-idle-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-idle-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-idle-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-idle-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-tk-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-tk-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-tk-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-tk-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150600.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-tools-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150600.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-tools-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150600.3.6.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-tools-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150600.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-tools-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-32bit-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-base-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-base-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-base-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-32bit-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-curses-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-curses-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-curses-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-curses-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-dbm-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-dbm-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-dbm-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-devel-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-devel-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-devel-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-devel-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-doc-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-doc-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-doc-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-doc-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-idle-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-idle-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-idle-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-idle-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-testsuite-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-testsuite-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-tk-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-tk-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-tk-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-tk-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150600.3.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64"
},
"product_reference": "python311-tools-3.11.10-150600.3.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150600.3.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le"
},
"product_reference": "python311-tools-3.11.10-150600.3.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150600.3.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x"
},
"product_reference": "python311-tools-3.11.10-150600.3.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150600.3.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
},
"product_reference": "python311-tools-3.11.10-150600.3.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T16:42:50Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T16:42:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python311-base-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-tools-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:libpython3_11-1_0-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:libpython3_11-1_0-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-base-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-base-32bit-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-curses-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-dbm-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-devel-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-doc-devhelp-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-idle-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-testsuite-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tk-3.11.10-150600.3.6.1.x86_64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.aarch64",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.ppc64le",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.s390x",
"openSUSE Leap 15.6:python311-tools-3.11.10-150600.3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T16:42:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
}
]
}
SUSE-SU-2024:3411-1
Vulnerability from csaf_suse - Published: 2024-09-24 07:40 - Updated: 2024-09-24 07:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python39",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python39 fixes the following issues:\n\n- Update to 3.9.20:\n- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)\n- CVE-2024-7592: quadratic algorithm used when parsing cookies leads to excessive resource consumption. (bsc#1229596)\n- CVE-2024-8088: lack of name validation when extracting a zip archive leads to infinite loops. (bsc#1229704)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3411,SUSE-SLE-Module-Legacy-15-SP5-2024-3411,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3411,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3411,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3411,SUSE-Storage-7.1-2024-3411,openSUSE-SLE-15.5-2024-3411,openSUSE-SLE-15.6-2024-3411",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3411-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3411-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243411-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3411-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019505.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1229704",
"url": "https://bugzilla.suse.com/1229704"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
}
],
"title": "Security update for python39",
"tracking": {
"current_release_date": "2024-09-24T07:40:52Z",
"generator": {
"date": "2024-09-24T07:40:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3411-1",
"initial_release_date": "2024-09-24T07:40:52Z",
"revision_history": [
{
"date": "2024-09-24T07:40:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"product_id": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-base-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-base-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-base-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-curses-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-curses-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-dbm-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-dbm-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-devel-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-devel-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-devel-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-doc-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-doc-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-doc-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-idle-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-idle-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-testsuite-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-tk-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-tk-3.9.20-150300.4.52.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-tools-3.9.20-150300.4.52.1.aarch64",
"product": {
"name": "python39-tools-3.9.20-150300.4.52.1.aarch64",
"product_id": "python39-tools-3.9.20-150300.4.52.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_9-1_0-64bit-3.9.20-150300.4.52.1.aarch64_ilp32",
"product": {
"name": "libpython3_9-1_0-64bit-3.9.20-150300.4.52.1.aarch64_ilp32",
"product_id": "libpython3_9-1_0-64bit-3.9.20-150300.4.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python39-64bit-3.9.20-150300.4.52.1.aarch64_ilp32",
"product": {
"name": "python39-64bit-3.9.20-150300.4.52.1.aarch64_ilp32",
"product_id": "python39-64bit-3.9.20-150300.4.52.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python39-base-64bit-3.9.20-150300.4.52.1.aarch64_ilp32",
"product": {
"name": "python39-base-64bit-3.9.20-150300.4.52.1.aarch64_ilp32",
"product_id": "python39-base-64bit-3.9.20-150300.4.52.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.i586",
"product": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.i586",
"product_id": "libpython3_9-1_0-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-3.9.20-150300.4.52.1.i586",
"product_id": "python39-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-base-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-base-3.9.20-150300.4.52.1.i586",
"product_id": "python39-base-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-curses-3.9.20-150300.4.52.1.i586",
"product_id": "python39-curses-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-dbm-3.9.20-150300.4.52.1.i586",
"product_id": "python39-dbm-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-devel-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-devel-3.9.20-150300.4.52.1.i586",
"product_id": "python39-devel-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-doc-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-doc-3.9.20-150300.4.52.1.i586",
"product_id": "python39-doc-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.i586",
"product_id": "python39-doc-devhelp-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-idle-3.9.20-150300.4.52.1.i586",
"product_id": "python39-idle-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-testsuite-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.i586",
"product_id": "python39-testsuite-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-tk-3.9.20-150300.4.52.1.i586",
"product_id": "python39-tk-3.9.20-150300.4.52.1.i586"
}
},
{
"category": "product_version",
"name": "python39-tools-3.9.20-150300.4.52.1.i586",
"product": {
"name": "python39-tools-3.9.20-150300.4.52.1.i586",
"product_id": "python39-tools-3.9.20-150300.4.52.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"product_id": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-base-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-base-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-base-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-curses-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-curses-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-dbm-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-devel-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-devel-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-devel-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-doc-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-doc-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-doc-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-idle-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-idle-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-testsuite-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-tk-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-tk-3.9.20-150300.4.52.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-tools-3.9.20-150300.4.52.1.ppc64le",
"product": {
"name": "python39-tools-3.9.20-150300.4.52.1.ppc64le",
"product_id": "python39-tools-3.9.20-150300.4.52.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"product_id": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-base-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-base-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-base-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-curses-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-curses-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-dbm-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-dbm-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-devel-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-devel-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-devel-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-doc-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-doc-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-doc-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-doc-devhelp-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-idle-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-idle-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-testsuite-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-testsuite-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-tk-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-tk-3.9.20-150300.4.52.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-tools-3.9.20-150300.4.52.1.s390x",
"product": {
"name": "python39-tools-3.9.20-150300.4.52.1.s390x",
"product_id": "python39-tools-3.9.20-150300.4.52.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"product_id": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"product_id": "libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-32bit-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-32bit-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-32bit-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-base-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-base-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-base-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-base-32bit-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-curses-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-dbm-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-devel-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-devel-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-devel-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-doc-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-doc-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-doc-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-idle-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-idle-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-testsuite-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-tk-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-tk-3.9.20-150300.4.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-tools-3.9.20-150300.4.52.1.x86_64",
"product": {
"name": "python39-tools-3.9.20-150300.4.52.1.x86_64",
"product_id": "python39-tools-3.9.20-150300.4.52.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-32bit-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-32bit-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-32bit-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-doc-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-doc-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-doc-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-doc-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-testsuite-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-32bit-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-32bit-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-base-32bit-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-curses-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-dbm-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-devel-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-devel-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-doc-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-doc-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-doc-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-doc-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-idle-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-testsuite-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-testsuite-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tk-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tools-3.9.20-150300.4.52.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
},
"product_reference": "python39-tools-3.9.20-150300.4.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T07:40:52Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T07:40:52Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Enterprise Storage 7.1:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:python39-tools-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-base-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-curses-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-devel-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-idle-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tk-3.9.20-150300.4.52.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.5:python39-tools-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:libpython3_9-1_0-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:libpython3_9-1_0-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-base-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-base-32bit-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-curses-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-dbm-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-devel-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-doc-devhelp-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-idle-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-testsuite-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tk-3.9.20-150300.4.52.1.x86_64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.aarch64",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.ppc64le",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.s390x",
"openSUSE Leap 15.6:python39-tools-3.9.20-150300.4.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T07:40:52Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
}
]
}
SUSE-SU-2025:20374-1
Vulnerability from csaf_suse - Published: 2025-06-03 09:04 - Updated: 2025-06-03 09:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python311",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python311 fixes the following issues:\n\n- CVE-2025-4516: Fixed blocking DecodeError handling\n vulnerability, which could lead to DoS. (bsc#1243273) \n\nUpdate to 3.11.12:\n\n - gh-105704: When using urllib.parse.urlsplit() and\n urllib.parse.urlparse() host parsing would not reject domain\n names containing square brackets ([ and ]). Square brackets\n are only valid for IPv6 and IPvFuture hosts according to RFC\n 3986 Section 3.2.2 (bsc#1236705, CVE-2025-0938,\n gh#python/cpython#105704).\n - gh-121284: Fix bug in the folding of rfc2047 encoded-words\n when flattening an email message using a modern email\n policy. Previously when an encoded-word was too long for\n a line, it would be decoded, split across lines, and\n re-encoded. But commas and other special characters in the\n original text could be left unencoded and unquoted. This\n could theoretically be used to spoof header lines using a\n carefully constructed encoded-word if the resulting rendered\n email was transmitted or re-parsed.\n - gh-80222: Fix bug in the folding of quoted strings\n when flattening an email message using a modern email\n policy. Previously when a quoted string was folded so that\n it spanned more than one line, the surrounding quotes and\n internal escapes would be omitted. This could theoretically\n be used to spoof header lines using a carefully constructed\n quoted string if the resulting rendered email was transmitted\n or re-parsed.\n - gh-119511: Fix a potential denial of service in the imaplib\n module. When connecting to a malicious server, it could\n cause an arbitrary amount of memory to be allocated. On many\n systems this is harmless as unused virtual memory is only\n a mapping, but if this hit a virtual address size limit\n it could lead to a MemoryError or other process crash. On\n unusual systems or builds where all allocated memory is\n touched and backed by actual ram or storage it could\u2019ve\n consumed resources doing so until similarly crashing.\n - gh-127257: In ssl, system call failures that OpenSSL reports\n using ERR_LIB_SYS are now raised as OSError.\n - gh-121277: Writers of CPython\u2019s documentation can now use\n next as the version for the versionchanged, versionadded,\n deprecated directives.\n - gh-106883: Disable GC during the _PyThread_CurrentFrames()\n and _PyThread_CurrentExceptions() calls to avoid the\n interpreter to deadlock.\n\n- CVE-2025-0938: disallow square brackets ([ and ]) in domain names for parsed\n URLs (bsc#1236705, gh#python/cpython#105704)\n\nUpdate to 3.11.11:\n\n - Tools/Demos\n\n - gh-123418: Update GitHub CI workflows to use OpenSSL 3.0.15\n and multissltests to use 3.0.15, 3.1.7, and 3.2.3.\n\n - Security\n\n - gh-122792: Changed IPv4-mapped ipaddress.IPv6Address to\n consistently use the mapped IPv4 address value for deciding\n properties. Properties which have their behavior fixed are\n is_multicast, is_reserved, is_link_local, is_global, and\n is_unspecified.\n\n - Library\n\n - gh-124651: Properly quote template strings in venv\n activation scripts (bsc#1232241, CVE-2024-9287).\n\n- Remove -IVendor/ from python-config bsc#1231795\n\n- CVE-2024-9287: Properly quote path names provided when creating a\n virtual environment (bsc#1232241,\n\n- Drop .pyc files from docdir for reproducible builds (bsc#1230906).\n\nUpdate to 3.11.10:\n\n - Security\n\n - gh-121957: Fixed missing audit events around interactive\n use of Python, now also properly firing for ``python -i``,\n as well as for ``python -m asyncio``. The event in question\n is ``cpython.run_stdin``.\n - gh-122133: Authenticate the socket connection for the\n ``socket.socketpair()`` fallback on platforms where\n ``AF_UNIX`` is not available like Windows. Patch by\n Gregory P. Smith \u003cgreg@krypto.org\u003e and Seth Larson\n \u003cseth@python.org\u003e. Reported by Ellie \u003cel@horse64.org\u003e\n - gh-121285: Remove backtracking from tarfile header parsing\n for ``hdrcharset``, PAX, and GNU sparse headers\n (bsc#1230227, CVE-2024-6232).\n - gh-118486: :func:`os.mkdir` on Windows now accepts\n *mode* of ``0o700`` to restrict the new directory to\n the current user. This fixes CVE-2024-4030 affecting\n :func:`tempfile.mkdtemp` in scenarios where the base\n temporary directory is more permissive than the default.\n\n - Library\n\n - gh-123270: Applied a more surgical fix for malformed\n payloads in :class:`zipfile.Path` causing infinite loops\n (gh-122905) without breaking contents using legitimate\n characters (bsc#1229704, CVE-2024-8088).\n - gh-123067: Fix quadratic complexity in parsing ``\"``-quoted\n cookie values with backslashes by :mod:`http.cookies`\n (bsc#1229596, CVE-2024-7592).\n - gh-122905: :class:`zipfile.Path` objects now sanitize names\n from the zipfile.\n - gh-121650: :mod:`email` headers with embedded newlines are\n now quoted on output. The :mod:`~email.generator` will now\n refuse to serialize (write) headers that are unsafely folded\n or delimited; see :attr:`~email.policy.Policy.verify_generated_headers`.\n (Contributed by Bas Bloemsaat and Petr Viktorin in\n :gh:`121650`; CVE-2024-6923, bsc#1228780).\n - gh-119506: Fix :meth:`!io.TextIOWrapper.write` method\n breaks internal buffer when the method is called again\n during flushing internal buffer.\n - gh-118643: Fix an AttributeError in the :mod:`email` module\n when re-fold a long address list. Also fix more cases of\n incorrect encoding of the address separator in the address\n list.\n - gh-113171: Fixed various false positives and false\n negatives in * :attr:`ipaddress.IPv4Address.is_private`\n (see these docs for details) *\n :attr:`ipaddress.IPv4Address.is_global` *\n :attr:`ipaddress.IPv6Address.is_private` *\n :attr:`ipaddress.IPv6Address.is_global` Also in the\n corresponding :class:`ipaddress.IPv4Network` and\n :class:`ipaddress.IPv6Network` attributes.\n Fixes bsc#1226448 (CVE-2024-4032).\n - gh-102988: :func:`email.utils.getaddresses` and\n :func:`email.utils.parseaddr` now return ``(\u0027\u0027, \u0027\u0027)``\n 2-tuples in more situations where invalid email addresses\n are encountered instead of potentially inaccurate\n values. Add optional *strict* parameter to these two\n functions: use ``strict=False`` to get the old behavior,\n accept malformed inputs. ``getattr(email.utils,\n \u0027supports_strict_parsing\u0027, False)`` can be use to check if\n the *strict* paramater is available. Patch by Thomas Dwyer\n and Victor Stinner to improve the CVE-2023-27043 fix\n (bsc#1210638).\n - gh-67693: Fix :func:`urllib.parse.urlunparse` and\n :func:`urllib.parse.urlunsplit` for URIs with path starting\n with multiple slashes and no authority. Based on patch by\n Ashwin Ramaswami.\n\n - Core and Builtins\n\n - gh-112275: A deadlock involving ``pystate.c``\u0027s\n ``HEAD_LOCK`` in ``posixmodule.c`` at fork is now\n fixed. Patch by ChuBoning based on previous Python 3.12 fix\n by Victor Stinner.\n - gh-109120: Added handle of incorrect star expressions, e.g\n ``f(3, *)``. Patch by Grigoryev Semyon\n\n- CVE-2024-8088: Prevent malformed payload to cause infinite loops in\n zipfile.Path (bsc#1229704)\n\n- Make pip and modern tools install directly in /usr/local when used by\n the user. (bsc#1225660)\n\n- CVE-2024-4032: Fix rearranging definition of private v global IP\n addresses. (bsc#1226448)\n\nUpdate to 3.11.9:\n\n * Security\n\n - gh-115398: Allow controlling Expat \u003e=2.6.0 reparse deferral\n (CVE-2023-52425, bsc#1219559) by adding five new methods:\n xml.etree.ElementTree.XMLParser.flush()\n xml.etree.ElementTree.XMLPullParser.flush()\n xml.parsers.expat.xmlparser.GetReparseDeferralEnabled()\n xml.parsers.expat.xmlparser.SetReparseDeferralEnabled()\n xml.sax.expatreader.ExpatParser.flush()\n - gh-115399: Update bundled libexpat to 2.6.0\n - gh-115243: Fix possible crashes in collections.deque.index()\n when the deque is concurrently modified.\n - gh-114572: ssl.SSLContext.cert_store_stats() and\n ssl.SSLContext.get_ca_certs() now correctly lock access to the\n certificate store, when the ssl.SSLContext is shared across\n multiple threads (bsc#1226447, CVE-2024-0397).\n\n * Core and Builtins\n\n - gh-116296: Fix possible refleak in object.__reduce__() internal\n error handling.\n - gh-116034: Fix location of the error on a failed assertion.\n - gh-115823: Properly calculate error ranges in the parser when\n raising SyntaxError exceptions caused by invalid byte sequences.\n Patch by Pablo Galindo\n - gh-112087: For an empty reverse iterator for list will be\n reduced to reversed(). Patch by Donghee Na.\n - gh-115011: Setters for members with an unsigned integer type now\n support the same range of valid values for objects that has a\n __index__() method as for int.\n - gh-96497: Fix incorrect resolution of mangled class variables\n used in assignment expressions in comprehensions.\n\n * Library\n\n - gh-117310: Fixed an unlikely early \u0026 extra Py_DECREF triggered\n crash in ssl when creating a new _ssl._SSLContext if CPython was\n built implausibly such that the default cipher list is empty or\n the SSL library it was linked against reports a failure from its\n C SSL_CTX_set_cipher_list() API.\n - gh-117178: Fix regression in lazy loading of self-referential\n modules, introduced in gh-114781.\n - gh-117084: Fix zipfile extraction for directory entries with the\n name containing backslashes on Windows.\n - gh-117110: Fix a bug that prevents subclasses of typing.Any to\n be instantiated with arguments. Patch by Chris Fu.\n - gh-90872: On Windows, subprocess.Popen.wait() no longer calls\n WaitForSingleObject() with a negative timeout: pass 0 ms if the\n timeout is negative. Patch by Victor Stinner.\n - gh-116957: configparser: Don\u2019t leave ConfigParser values in an\n invalid state (stored as a list instead of a str) after an\n earlier read raised DuplicateSectionError or\n DuplicateOptionError.\n - gh-90095: Ignore empty lines and comments in .pdbrc\n - gh-116764: Restore support of None and other false values in\n urllib.parse functions parse_qs() and parse_qsl(). Also, they\n now raise a TypeError for non-zero integers and non-empty\n sequences.\n - gh-116811: In PathFinder.invalidate_caches, delegate to\n MetadataPathFinder.invalidate_caches.\n - gh-116600: Fix repr() for global Flag members.\n - gh-116484: Change automatically generated tkinter.Checkbutton\n widget names to avoid collisions with automatically generated\n tkinter.ttk.Checkbutton widget names within the same parent\n widget.\n - gh-116401: Fix blocking os.fwalk() and shutil.rmtree() on\n opening named pipe.\n - gh-116143: Fix a race in pydoc _start_server, eliminating a\n window in which _start_server can return a thread that is\n \u201cserving\u201d but without a docserver set.\n - gh-116325: typing: raise SyntaxError instead of AttributeError\n on forward references as empty strings.\n - gh-90535: Fix support of interval values \u003e 1 in\n logging.TimedRotatingFileHandler for when=\u0027MIDNIGHT\u0027 and\n when=\u0027Wx\u0027.\n - gh-115978: Disable preadv(), readv(), pwritev(), and writev() on\n WASI.\n - Under wasmtime for WASI 0.2, these functions don\u2019t pass\n test_posix\n (https://github.com/bytecodealliance/wasmtime/issues/7830).\n - gh-88352: Fix the computation of the next rollover time in the\n logging.TimedRotatingFileHandler handler. computeRollover() now\n always returns a timestamp larger than the specified time and\n works correctly during the DST change. doRollover() no longer\n overwrite the already rolled over file, saving from data loss\n when run at midnight or during repeated time at the DST change.\n - gh-87115: Set __main__.__spec__ to None when running a script\n with pdb\n - gh-76511: Fix UnicodeEncodeError in email.Message.as_string()\n that results when a message that claims to be in the ascii\n character set actually has non-ascii characters. Non-ascii\n characters are now replaced with the U+FFFD replacement\n character, like in the replace error handler.\n - gh-75988: Fixed unittest.mock.create_autospec() to pass the call\n through to the wrapped object to return the real result.\n - gh-115881: Fix issue where ast.parse() would incorrectly flag\n conditional context managers (such as with (x() if y else z()):\n ...) as invalid syntax if feature_version=(3, 8) was passed.\n This reverts changes to the grammar made as part of gh-94949.\n - gh-115886: Fix silent truncation of the name with an embedded\n null character in multiprocessing.shared_memory.SharedMemory.\n - gh-115809: Improve algorithm for computing which rolled-over log\n files to delete in logging.TimedRotatingFileHandler. It is now\n reliable for handlers without namer and with arbitrary\n deterministic namer that leaves the datetime part in the file\n name unmodified.\n - gh-74668: urllib.parse functions parse_qs() and parse_qsl() now\n support bytes arguments containing raw and percent-encoded\n non-ASCII data.\n - gh-67044: csv.writer() now always quotes or escapes \u0027\\r\u0027 and\n \u0027\\n\u0027, regardless of lineterminator value.\n - gh-115712: csv.writer() now quotes empty fields if delimiter is\n a space and skipinitialspace is true and raises exception if\n quoting is not possible.\n - gh-115618: Fix improper decreasing the reference count for None\n argument in property methods getter(), setter() and deleter().\n - gh-115570: A DeprecationWarning is no longer omitted on access\n to the __doc__ attributes of the deprecated typing.io and\n typing.re pseudo-modules.\n - gh-112006: Fix inspect.unwrap() for types with the __wrapper__\n data descriptor.\n - gh-101293: Support callables with the __call__() method and\n types with __new__() and __init__() methods set to class\n methods, static methods, bound methods, partial functions, and\n other types of methods and descriptors in\n inspect.Signature.from_callable().\n - gh-115392: Fix a bug in doctest where incorrect line numbers\n would be reported for decorated functions.\n - gh-114563: Fix several format() bugs when using the C\n implementation of Decimal: * memory leak in some rare cases when\n using the z format option (coerce negative 0) * incorrect output\n when applying the z format option to type F (fixed-point with\n capital NAN / INF) * incorrect output when applying the # format\n option (alternate form)\n - gh-115197: urllib.request no longer resolves the hostname before\n checking it against the system\u2019s proxy bypass list on macOS and\n Windows.\n - gh-115198: Fix support of Docutils \u003e= 0.19 in distutils.\n - gh-115165: Most exceptions are now ignored when attempting to\n set the __orig_class__ attribute on objects returned when\n calling typing generic aliases (including generic aliases\n created using typing.Annotated). Previously only AttributeError\n was ignored. Patch by Dave Shawley.\n - gh-115133: Fix tests for XMLPullParser with Expat 2.6.0.\n - gh-115059: io.BufferedRandom.read1() now flushes the underlying\n write buffer.\n - gh-79382: Trailing ** no longer allows to match files and\n non-existing paths in recursive glob().\n - gh-114763: Protect modules loaded with importlib.util.LazyLoader\n from race conditions when multiple threads try to access\n attributes before the loading is complete.\n - gh-97959: Fix rendering class methods, bound methods, method and\n function aliases in pydoc. Class methods no longer have \u201cmethod\n of builtins.type instance\u201d note. Corresponding notes are now\n added for class and unbound methods. Method and function aliases\n now have references to the module or the class where the origin\n was defined if it differs from the current. Bound methods are\n now listed in the static methods section. Methods of builtin\n classes are now supported as well as methods of Python classes.\n - gh-112281: Allow creating union of types for typing.Annotated\n with unhashable metadata.\n - gh-111775: Fix importlib.resources.simple.ResourceHandle.open()\n for text mode, added missed stream argument.\n - gh-90095: Make .pdbrc and -c work with any valid pdb commands.\n - gh-107155: Fix incorrect output of help(x) where x is a lambda\n function, which has an __annotations__ dictionary attribute with\n a \"return\" key.\n - gh-105866: Fixed _get_slots bug which caused error when defining\n dataclasses with slots and a weakref_slot.\n - gh-60346: Fix ArgumentParser inconsistent with parse_known_args.\n - gh-100985: Update HTTPSConnection to consistently wrap IPv6\n Addresses when using a proxy.\n - gh-100884: email: fix misfolding of comma in address-lists\n over multiple lines in combination with unicode encoding\n (bsc#1238450 CVE-2025-1795)\n - gh-95782: Fix io.BufferedReader.tell(),\n io.BufferedReader.seek(), _pyio.BufferedReader.tell(),\n io.BufferedRandom.tell(), io.BufferedRandom.seek() and\n _pyio.BufferedRandom.tell() being able to return negative\n offsets.\n - gh-96310: Fix a traceback in argparse when all options in a\n mutually exclusive group are suppressed.\n - gh-93205: Fixed a bug in\n logging.handlers.TimedRotatingFileHandler where multiple\n rotating handler instances pointing to files with the same name\n but different extensions would conflict and not delete the\n correct files.\n - bpo-44865: Add missing call to localization function in\n argparse.\n - bpo-43952: Fix multiprocessing.connection.Listener.accept() to\n accept empty bytes as authkey. Not accepting empty bytes as key\n causes it to hang indefinitely.\n - bpo-42125: linecache: get module name from __spec__ if\n available. This allows getting source code for the __main__\n module when a custom loader is used.\n - gh-66543: Make mimetypes.guess_type() properly parsing of URLs\n with only a host name, URLs containing fragment or query, and\n filenames with only a UNC sharepoint on Windows. Based on patch\n by Dong-hee Na.\n - bpo-33775: Add \u2018default\u2019 and \u2018version\u2019 help text for\n localization in argparse.\n\n * Documentation\n\n - gh-115399: Document CVE-2023-52425 of Expat \u003c2.6.0 under \u201cXML\n vulnerabilities\u201d.\n - gh-115233: Fix an example for LoggerAdapter in the Logging\n Cookbook.\n\n * IDLE\n\n - gh-88516: On macOS show a proxy icon in the title bar of editor\n windows to match platform behaviour.\n\n * Tools/Demos\n\n - gh-113516: Don\u2019t set LDSHARED when building for WASI.\n\n * C API\n\n - gh-117021: Fix integer overflow in PyLong_AsPid() on non-Windows\n 64-bit platforms.\n\n- Add reference to CVE-2024-0450 (bsc#1221854) to changelog.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-128",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20374-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20374-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520374-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20374-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html"
},
{
"category": "self",
"summary": "SUSE Bug 1210638",
"url": "https://bugzilla.suse.com/1210638"
},
{
"category": "self",
"summary": "SUSE Bug 1219559",
"url": "https://bugzilla.suse.com/1219559"
},
{
"category": "self",
"summary": "SUSE Bug 1219666",
"url": "https://bugzilla.suse.com/1219666"
},
{
"category": "self",
"summary": "SUSE Bug 1221854",
"url": "https://bugzilla.suse.com/1221854"
},
{
"category": "self",
"summary": "SUSE Bug 1225660",
"url": "https://bugzilla.suse.com/1225660"
},
{
"category": "self",
"summary": "SUSE Bug 1226447",
"url": "https://bugzilla.suse.com/1226447"
},
{
"category": "self",
"summary": "SUSE Bug 1226448",
"url": "https://bugzilla.suse.com/1226448"
},
{
"category": "self",
"summary": "SUSE Bug 1227378",
"url": "https://bugzilla.suse.com/1227378"
},
{
"category": "self",
"summary": "SUSE Bug 1227999",
"url": "https://bugzilla.suse.com/1227999"
},
{
"category": "self",
"summary": "SUSE Bug 1228165",
"url": "https://bugzilla.suse.com/1228165"
},
{
"category": "self",
"summary": "SUSE Bug 1228780",
"url": "https://bugzilla.suse.com/1228780"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1229704",
"url": "https://bugzilla.suse.com/1229704"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE Bug 1230906",
"url": "https://bugzilla.suse.com/1230906"
},
{
"category": "self",
"summary": "SUSE Bug 1231795",
"url": "https://bugzilla.suse.com/1231795"
},
{
"category": "self",
"summary": "SUSE Bug 1232241",
"url": "https://bugzilla.suse.com/1232241"
},
{
"category": "self",
"summary": "SUSE Bug 1236705",
"url": "https://bugzilla.suse.com/1236705"
},
{
"category": "self",
"summary": "SUSE Bug 1238450",
"url": "https://bugzilla.suse.com/1238450"
},
{
"category": "self",
"summary": "SUSE Bug 1239210",
"url": "https://bugzilla.suse.com/1239210"
},
{
"category": "self",
"summary": "SUSE Bug 1241067",
"url": "https://bugzilla.suse.com/1241067"
},
{
"category": "self",
"summary": "SUSE Bug 1243273",
"url": "https://bugzilla.suse.com/1243273"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-25236 page",
"url": "https://www.suse.com/security/cve/CVE-2022-25236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-27043 page",
"url": "https://www.suse.com/security/cve/CVE-2023-27043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52425 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6597 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0397 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0397/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0450 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4032 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-9287 page",
"url": "https://www.suse.com/security/cve/CVE-2024-9287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-0938 page",
"url": "https://www.suse.com/security/cve/CVE-2025-0938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-1795 page",
"url": "https://www.suse.com/security/cve/CVE-2025-1795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4516 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4516/"
}
],
"title": "Security update for python311",
"tracking": {
"current_release_date": "2025-06-03T09:04:41Z",
"generator": {
"date": "2025-06-03T09:04:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20374-1",
"initial_release_date": "2025-06-03T09:04:41Z",
"revision_history": [
{
"date": "2025-06-03T09:04:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"product": {
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"product_id": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-3.11.12-slfo.1.1_1.1.aarch64",
"product": {
"name": "python311-3.11.12-slfo.1.1_1.1.aarch64",
"product_id": "python311-3.11.12-slfo.1.1_1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"product": {
"name": "python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"product_id": "python311-base-3.11.12-slfo.1.1_1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"product": {
"name": "python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"product_id": "python311-curses-3.11.12-slfo.1.1_1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"product": {
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"product_id": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-3.11.12-slfo.1.1_1.1.ppc64le",
"product": {
"name": "python311-3.11.12-slfo.1.1_1.1.ppc64le",
"product_id": "python311-3.11.12-slfo.1.1_1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"product": {
"name": "python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"product_id": "python311-base-3.11.12-slfo.1.1_1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"product": {
"name": "python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"product_id": "python311-curses-3.11.12-slfo.1.1_1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"product": {
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"product_id": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-3.11.12-slfo.1.1_1.1.s390x",
"product": {
"name": "python311-3.11.12-slfo.1.1_1.1.s390x",
"product_id": "python311-3.11.12-slfo.1.1_1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.12-slfo.1.1_1.1.s390x",
"product": {
"name": "python311-base-3.11.12-slfo.1.1_1.1.s390x",
"product_id": "python311-base-3.11.12-slfo.1.1_1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"product": {
"name": "python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"product_id": "python311-curses-3.11.12-slfo.1.1_1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"product": {
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"product_id": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-3.11.12-slfo.1.1_1.1.x86_64",
"product": {
"name": "python311-3.11.12-slfo.1.1_1.1.x86_64",
"product_id": "python311-3.11.12-slfo.1.1_1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"product": {
"name": "python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"product_id": "python311-base-3.11.12-slfo.1.1_1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.12-slfo.1.1_1.1.x86_64",
"product": {
"name": "python311-curses-3.11.12-slfo.1.1_1.1.x86_64",
"product_id": "python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.12-slfo.1.1_1.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64"
},
"product_reference": "python311-3.11.12-slfo.1.1_1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.12-slfo.1.1_1.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le"
},
"product_reference": "python311-3.11.12-slfo.1.1_1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.12-slfo.1.1_1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x"
},
"product_reference": "python311-3.11.12-slfo.1.1_1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.12-slfo.1.1_1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64"
},
"product_reference": "python311-3.11.12-slfo.1.1_1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.12-slfo.1.1_1.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64"
},
"product_reference": "python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.12-slfo.1.1_1.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le"
},
"product_reference": "python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.12-slfo.1.1_1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x"
},
"product_reference": "python311-base-3.11.12-slfo.1.1_1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.12-slfo.1.1_1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64"
},
"product_reference": "python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.12-slfo.1.1_1.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64"
},
"product_reference": "python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.12-slfo.1.1_1.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le"
},
"product_reference": "python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.12-slfo.1.1_1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x"
},
"product_reference": "python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.12-slfo.1.1_1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
},
"product_reference": "python311-curses-3.11.12-slfo.1.1_1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-25236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-25236"
}
],
"notes": [
{
"category": "general",
"text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-25236",
"url": "https://www.suse.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "SUSE Bug 1196025 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196025"
},
{
"category": "external",
"summary": "SUSE Bug 1196784 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196784"
},
{
"category": "external",
"summary": "SUSE Bug 1197217 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1197217"
},
{
"category": "external",
"summary": "SUSE Bug 1200038 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1200038"
},
{
"category": "external",
"summary": "SUSE Bug 1201735 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1201735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "important"
}
],
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2023-27043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-27043"
}
],
"notes": [
{
"category": "general",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-27043",
"url": "https://www.suse.com/security/cve/CVE-2023-27043"
},
{
"category": "external",
"summary": "SUSE Bug 1210638 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1210638"
},
{
"category": "external",
"summary": "SUSE Bug 1222537 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1222537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-52425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52425"
}
],
"notes": [
{
"category": "general",
"text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52425",
"url": "https://www.suse.com/security/cve/CVE-2023-52425"
},
{
"category": "external",
"summary": "SUSE Bug 1219559 for CVE-2023-52425",
"url": "https://bugzilla.suse.com/1219559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-6597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6597"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.\n\nThe tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6597",
"url": "https://www.suse.com/security/cve/CVE-2023-6597"
},
{
"category": "external",
"summary": "SUSE Bug 1219666 for CVE-2023-6597",
"url": "https://bugzilla.suse.com/1219666"
},
{
"category": "external",
"summary": "SUSE Bug 1221854 for CVE-2023-6597",
"url": "https://bugzilla.suse.com/1221854"
},
{
"category": "external",
"summary": "SUSE Bug 1224879 for CVE-2023-6597",
"url": "https://bugzilla.suse.com/1224879"
},
{
"category": "external",
"summary": "SUSE Bug 1225185 for CVE-2023-6597",
"url": "https://bugzilla.suse.com/1225185"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "important"
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2024-0397",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0397"
}
],
"notes": [
{
"category": "general",
"text": "A defect was discovered in the Python \"ssl\" module where there is a memory\nrace condition with the ssl.SSLContext methods \"cert_store_stats()\" and\n\"get_ca_certs()\". The race condition can be triggered if the methods are\ncalled at the same time as certificates are loaded into the SSLContext,\nsuch as during the TLS handshake with a certificate directory configured.\nThis issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0397",
"url": "https://www.suse.com/security/cve/CVE-2024-0397"
},
{
"category": "external",
"summary": "SUSE Bug 1226447 for CVE-2024-0397",
"url": "https://bugzilla.suse.com/1226447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0450"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.\n\nThe zipfile module is vulnerable to \"quoted-overlap\" zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0450",
"url": "https://www.suse.com/security/cve/CVE-2024-0450"
},
{
"category": "external",
"summary": "SUSE Bug 1221854 for CVE-2024-0450",
"url": "https://bugzilla.suse.com/1221854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4032"
}
],
"notes": [
{
"category": "general",
"text": "The \"ipaddress\" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \"globally reachable\" or \"private\". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn\u0027t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.\n\nCPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4032",
"url": "https://www.suse.com/security/cve/CVE-2024-4032"
},
{
"category": "external",
"summary": "SUSE Bug 1226448 for CVE-2024-4032",
"url": "https://bugzilla.suse.com/1226448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "low"
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6923"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u0027t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6923",
"url": "https://www.suse.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "SUSE Bug 1228780 for CVE-2024-6923",
"url": "https://bugzilla.suse.com/1228780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "important"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
},
{
"cve": "CVE-2024-9287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-9287"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren\u0027t activated before being used (ie \"./venv/bin/python\") are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-9287",
"url": "https://www.suse.com/security/cve/CVE-2024-9287"
},
{
"category": "external",
"summary": "SUSE Bug 1232241 for CVE-2024-9287",
"url": "https://bugzilla.suse.com/1232241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-9287"
},
{
"cve": "CVE-2025-0938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-0938"
}
],
"notes": [
{
"category": "general",
"text": "The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn\u0027t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-0938",
"url": "https://www.suse.com/security/cve/CVE-2025-0938"
},
{
"category": "external",
"summary": "SUSE Bug 1236705 for CVE-2025-0938",
"url": "https://bugzilla.suse.com/1236705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-0938"
},
{
"cve": "CVE-2025-1795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-1795"
}
],
"notes": [
{
"category": "general",
"text": "During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-1795",
"url": "https://www.suse.com/security/cve/CVE-2025-1795"
},
{
"category": "external",
"summary": "SUSE Bug 1238450 for CVE-2025-1795",
"url": "https://bugzilla.suse.com/1238450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "low"
}
],
"title": "CVE-2025-1795"
},
{
"cve": "CVE-2025-4516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4516"
}
],
"notes": [
{
"category": "general",
"text": "There is an issue in CPython when using `bytes.decode(\"unicode_escape\", error=\"ignore|replace\")`. If you are not using the \"unicode_escape\" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4516",
"url": "https://www.suse.com/security/cve/CVE-2025-4516"
},
{
"category": "external",
"summary": "SUSE Bug 1243273 for CVE-2025-4516",
"url": "https://bugzilla.suse.com/1243273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libpython3_11-1_0-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-base-3.11.12-slfo.1.1_1.1.x86_64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:python311-curses-3.11.12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-03T09:04:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-4516"
}
]
}
SUSE-SU-2024:3384-1
Vulnerability from csaf_suse - Published: 2024-09-23 08:32 - Updated: 2024-09-23 08:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python3 fixes the following issues:\n\n- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)\n- CVE-2024-7592: quadratic algorithm used when parsing cookies leads to excessive resource consumption. (bsc#1229596)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3384,SUSE-SLE-Module-Web-Scripting-12-2024-3384,SUSE-SLE-SDK-12-SP5-2024-3384,SUSE-SLE-SERVER-12-SP5-2024-3384",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3384-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3384-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243384-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3384-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019496.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
}
],
"title": "Security update for python3",
"tracking": {
"current_release_date": "2024-09-23T08:32:28Z",
"generator": {
"date": "2024-09-23T08:32:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3384-1",
"initial_release_date": "2024-09-23T08:32:28Z",
"revision_history": [
{
"date": "2024-09-23T08:32:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"product": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"product_id": "libpython3_4m1_0-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-3.4.10-25.139.1.aarch64",
"product_id": "python3-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-base-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-base-3.4.10-25.139.1.aarch64",
"product_id": "python3-base-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-curses-3.4.10-25.139.1.aarch64",
"product_id": "python3-curses-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-dbm-3.4.10-25.139.1.aarch64",
"product_id": "python3-dbm-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-devel-3.4.10-25.139.1.aarch64",
"product_id": "python3-devel-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-idle-3.4.10-25.139.1.aarch64",
"product_id": "python3-idle-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-testsuite-3.4.10-25.139.1.aarch64",
"product_id": "python3-testsuite-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-tk-3.4.10-25.139.1.aarch64",
"product_id": "python3-tk-3.4.10-25.139.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.4.10-25.139.1.aarch64",
"product": {
"name": "python3-tools-3.4.10-25.139.1.aarch64",
"product_id": "python3-tools-3.4.10-25.139.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_4m1_0-64bit-3.4.10-25.139.1.aarch64_ilp32",
"product": {
"name": "libpython3_4m1_0-64bit-3.4.10-25.139.1.aarch64_ilp32",
"product_id": "libpython3_4m1_0-64bit-3.4.10-25.139.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python3-64bit-3.4.10-25.139.1.aarch64_ilp32",
"product": {
"name": "python3-64bit-3.4.10-25.139.1.aarch64_ilp32",
"product_id": "python3-64bit-3.4.10-25.139.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python3-base-64bit-3.4.10-25.139.1.aarch64_ilp32",
"product": {
"name": "python3-base-64bit-3.4.10-25.139.1.aarch64_ilp32",
"product_id": "python3-base-64bit-3.4.10-25.139.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_4m1_0-3.4.10-25.139.1.i586",
"product": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.i586",
"product_id": "libpython3_4m1_0-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-3.4.10-25.139.1.i586",
"product": {
"name": "python3-3.4.10-25.139.1.i586",
"product_id": "python3-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-base-3.4.10-25.139.1.i586",
"product": {
"name": "python3-base-3.4.10-25.139.1.i586",
"product_id": "python3-base-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-curses-3.4.10-25.139.1.i586",
"product": {
"name": "python3-curses-3.4.10-25.139.1.i586",
"product_id": "python3-curses-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.4.10-25.139.1.i586",
"product": {
"name": "python3-dbm-3.4.10-25.139.1.i586",
"product_id": "python3-dbm-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-devel-3.4.10-25.139.1.i586",
"product": {
"name": "python3-devel-3.4.10-25.139.1.i586",
"product_id": "python3-devel-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-idle-3.4.10-25.139.1.i586",
"product": {
"name": "python3-idle-3.4.10-25.139.1.i586",
"product_id": "python3-idle-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.4.10-25.139.1.i586",
"product": {
"name": "python3-testsuite-3.4.10-25.139.1.i586",
"product_id": "python3-testsuite-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-tk-3.4.10-25.139.1.i586",
"product": {
"name": "python3-tk-3.4.10-25.139.1.i586",
"product_id": "python3-tk-3.4.10-25.139.1.i586"
}
},
{
"category": "product_version",
"name": "python3-tools-3.4.10-25.139.1.i586",
"product": {
"name": "python3-tools-3.4.10-25.139.1.i586",
"product_id": "python3-tools-3.4.10-25.139.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-doc-3.4.10-25.139.1.noarch",
"product": {
"name": "python3-doc-3.4.10-25.139.1.noarch",
"product_id": "python3-doc-3.4.10-25.139.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-doc-pdf-3.4.10-25.139.1.noarch",
"product": {
"name": "python3-doc-pdf-3.4.10-25.139.1.noarch",
"product_id": "python3-doc-pdf-3.4.10-25.139.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"product": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"product_id": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-3.4.10-25.139.1.ppc64le",
"product_id": "python3-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-base-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-base-3.4.10-25.139.1.ppc64le",
"product_id": "python3-base-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-curses-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-curses-3.4.10-25.139.1.ppc64le",
"product_id": "python3-curses-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-dbm-3.4.10-25.139.1.ppc64le",
"product_id": "python3-dbm-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-devel-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-devel-3.4.10-25.139.1.ppc64le",
"product_id": "python3-devel-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-idle-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-idle-3.4.10-25.139.1.ppc64le",
"product_id": "python3-idle-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-testsuite-3.4.10-25.139.1.ppc64le",
"product_id": "python3-testsuite-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tk-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-tk-3.4.10-25.139.1.ppc64le",
"product_id": "python3-tk-3.4.10-25.139.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tools-3.4.10-25.139.1.ppc64le",
"product": {
"name": "python3-tools-3.4.10-25.139.1.ppc64le",
"product_id": "python3-tools-3.4.10-25.139.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_4m1_0-3.4.10-25.139.1.s390",
"product": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.s390",
"product_id": "libpython3_4m1_0-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-3.4.10-25.139.1.s390",
"product": {
"name": "python3-3.4.10-25.139.1.s390",
"product_id": "python3-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-base-3.4.10-25.139.1.s390",
"product": {
"name": "python3-base-3.4.10-25.139.1.s390",
"product_id": "python3-base-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-curses-3.4.10-25.139.1.s390",
"product": {
"name": "python3-curses-3.4.10-25.139.1.s390",
"product_id": "python3-curses-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.4.10-25.139.1.s390",
"product": {
"name": "python3-dbm-3.4.10-25.139.1.s390",
"product_id": "python3-dbm-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-devel-3.4.10-25.139.1.s390",
"product": {
"name": "python3-devel-3.4.10-25.139.1.s390",
"product_id": "python3-devel-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-idle-3.4.10-25.139.1.s390",
"product": {
"name": "python3-idle-3.4.10-25.139.1.s390",
"product_id": "python3-idle-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.4.10-25.139.1.s390",
"product": {
"name": "python3-testsuite-3.4.10-25.139.1.s390",
"product_id": "python3-testsuite-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-tk-3.4.10-25.139.1.s390",
"product": {
"name": "python3-tk-3.4.10-25.139.1.s390",
"product_id": "python3-tk-3.4.10-25.139.1.s390"
}
},
{
"category": "product_version",
"name": "python3-tools-3.4.10-25.139.1.s390",
"product": {
"name": "python3-tools-3.4.10-25.139.1.s390",
"product_id": "python3-tools-3.4.10-25.139.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_4m1_0-3.4.10-25.139.1.s390x",
"product": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.s390x",
"product_id": "libpython3_4m1_0-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"product": {
"name": "libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"product_id": "libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-3.4.10-25.139.1.s390x",
"product_id": "python3-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-32bit-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-32bit-3.4.10-25.139.1.s390x",
"product_id": "python3-32bit-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-base-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-base-3.4.10-25.139.1.s390x",
"product_id": "python3-base-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-base-32bit-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-base-32bit-3.4.10-25.139.1.s390x",
"product_id": "python3-base-32bit-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-curses-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-curses-3.4.10-25.139.1.s390x",
"product_id": "python3-curses-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-dbm-3.4.10-25.139.1.s390x",
"product_id": "python3-dbm-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-devel-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-devel-3.4.10-25.139.1.s390x",
"product_id": "python3-devel-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-idle-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-idle-3.4.10-25.139.1.s390x",
"product_id": "python3-idle-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-testsuite-3.4.10-25.139.1.s390x",
"product_id": "python3-testsuite-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-tk-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-tk-3.4.10-25.139.1.s390x",
"product_id": "python3-tk-3.4.10-25.139.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-tools-3.4.10-25.139.1.s390x",
"product": {
"name": "python3-tools-3.4.10-25.139.1.s390x",
"product_id": "python3-tools-3.4.10-25.139.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"product": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"product_id": "libpython3_4m1_0-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"product": {
"name": "libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"product_id": "libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-3.4.10-25.139.1.x86_64",
"product_id": "python3-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-32bit-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-32bit-3.4.10-25.139.1.x86_64",
"product_id": "python3-32bit-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-base-3.4.10-25.139.1.x86_64",
"product_id": "python3-base-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-32bit-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-base-32bit-3.4.10-25.139.1.x86_64",
"product_id": "python3-base-32bit-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-curses-3.4.10-25.139.1.x86_64",
"product_id": "python3-curses-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-dbm-3.4.10-25.139.1.x86_64",
"product_id": "python3-dbm-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-devel-3.4.10-25.139.1.x86_64",
"product_id": "python3-devel-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-idle-3.4.10-25.139.1.x86_64",
"product_id": "python3-idle-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-testsuite-3.4.10-25.139.1.x86_64",
"product_id": "python3-testsuite-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-tk-3.4.10-25.139.1.x86_64",
"product_id": "python3-tk-3.4.10-25.139.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.4.10-25.139.1.x86_64",
"product": {
"name": "python3-tools-3.4.10-25.139.1.x86_64",
"product_id": "python3-tools-3.4.10-25.139.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product": {
"name": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-web-scripting:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.aarch64"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.ppc64le"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.s390x"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.x86_64"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-base-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-base-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-base-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-base-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-curses-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-curses-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-curses-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12",
"product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-curses-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-dbm-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-dbm-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-dbm-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-dbm-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-devel-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-devel-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-devel-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-devel-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x"
},
"product_reference": "libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64"
},
"product_reference": "libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-base-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-base-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-base-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-base-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-curses-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-curses-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-curses-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-curses-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-devel-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-devel-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-devel-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-devel-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-tk-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-tk-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-tk-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-tk-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64"
},
"product_reference": "libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x"
},
"product_reference": "libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64"
},
"product_reference": "libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-base-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-base-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-base-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-base-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-curses-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-curses-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-curses-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-curses-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-devel-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-devel-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-devel-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-devel-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.4.10-25.139.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.aarch64"
},
"product_reference": "python3-tk-3.4.10-25.139.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.4.10-25.139.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le"
},
"product_reference": "python3-tk-3.4.10-25.139.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.4.10-25.139.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.s390x"
},
"product_reference": "python3-tk-3.4.10-25.139.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.4.10-25.139.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.x86_64"
},
"product_reference": "python3-tk-3.4.10-25.139.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-23T08:32:28Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Module for Web and Scripting 12:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libpython3_4m1_0-32bit-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-base-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-devel-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-dbm-3.4.10-25.139.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-devel-3.4.10-25.139.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-23T08:32:28Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
}
]
}
SUSE-SU-2025:20154-1
Vulnerability from csaf_suse - Published: 2025-03-19 11:31 - Updated: 2025-03-19 11:31Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python311",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python311 fixes the following issues:\n\n- Skip PGO with %want_reproducible_builds (bsc#1239210)\n\n- CVE-2025-0938: Disallows square brackets ([ and ]) in domain names for parsed\n URLs (bsc#1236705).\n\n- Configure externally_managed with a bcond (bsc#1228165).\n\n- Update to 3.11.11:\n - Tools/Demos\n - gh-123418: Update GitHub CI workflows to use OpenSSL 3.0.15\n and multissltests to use 3.0.15, 3.1.7, and 3.2.3.\n - Tests\n - gh-125041: Re-enable skipped tests for zlib on the\n s390x architecture: only skip checks of the compressed\n bytes, which can be different between zlib\u2019s software\n implementation and the hardware-accelerated implementation.\n - Security\n - gh-126623: Upgrade libexpat to 2.6.4\n - gh-122792: Changed IPv4-mapped ipaddress.IPv6Address to\n consistently use the mapped IPv4 address value for deciding\n properties. Properties which have their behavior fixed are\n is_multicast, is_reserved, is_link_local, is_global, and\n is_unspecified.\n - Library\n - gh-124651: Properly quote template strings in venv\n activation scripts (bsc#1232241, CVE-2024-9287).\n\n- Remove -IVendor/ from python-config (bsc#1231795)\n\n- CVE-2024-9287: Properly quote path names provided when creating a\n virtual environment (bsc#1232241)\n\n- Drop .pyc files from docdir for reproducible builds\n (bsc#1230906).\n\n- Update to 3.11.10:\n - Security\n - gh-123678: Upgrade libexpat to 2.6.3\n - gh-121957: Fixed missing audit events around interactive\n use of Python, now also properly firing for ``python -i``,\n as well as for ``python -m asyncio``. The event in question\n is ``cpython.run_stdin``.\n - gh-122133: Authenticate the socket connection for the\n ``socket.socketpair()`` fallback on platforms where\n ``AF_UNIX`` is not available like Windows. Patch by\n Gregory P. Smith \u003cgreg@krypto.org\u003e and Seth Larson\n \u003cseth@python.org\u003e. Reported by Ellie \u003cel@horse64.org\u003e\n - gh-121285: Remove backtracking from tarfile header parsing\n for ``hdrcharset``, PAX, and GNU sparse headers\n (bsc#1230227, CVE-2024-6232).\n - gh-118486: :func:`os.mkdir` on Windows now accepts\n *mode* of ``0o700`` to restrict the new directory to\n the current user. This fixes CVE-2024-4030 affecting\n :func:`tempfile.mkdtemp` in scenarios where the base\n temporary directory is more permissive than the default.\n - gh-116741: Update bundled libexpat to 2.6.2\n - Library\n - gh-123270: Applied a more surgical fix for malformed\n payloads in :class:`zipfile.Path` causing infinite loops\n (gh-122905) without breaking contents using legitimate\n characters (bsc#1229704, CVE-2024-8088).\n - gh-123067: Fix quadratic complexity in parsing ``\"``-quoted\n cookie values with backslashes by :mod:`http.cookies`\n (bsc#1229596, CVE-2024-7592).\n - gh-122905: :class:`zipfile.Path` objects now sanitize names\n from the zipfile.\n - gh-121650: :mod:`email` headers with embedded newlines are\n now quoted on output. The :mod:`~email.generator` will now\n refuse to serialize (write) headers that are unsafely folded\n or delimited; see :attr:`~email.policy.Policy.verify_generated_headers`.\n (Contributed by Bas Bloemsaat and Petr Viktorin in\n :gh:`121650`; CVE-2024-6923, bsc#1228780).\n - gh-119506: Fix :meth:`!io.TextIOWrapper.write` method\n breaks internal buffer when the method is called again\n during flushing internal buffer.\n - gh-118643: Fix an AttributeError in the :mod:`email` module\n when re-fold a long address list. Also fix more cases of\n incorrect encoding of the address separator in the address\n list.\n - gh-113171: Fixed various false positives and false\n negatives in * :attr:`ipaddress.IPv4Address.is_private`\n (see these docs for details) *\n :attr:`ipaddress.IPv4Address.is_global` *\n :attr:`ipaddress.IPv6Address.is_private` *\n :attr:`ipaddress.IPv6Address.is_global` Also in the\n corresponding :class:`ipaddress.IPv4Network` and\n :class:`ipaddress.IPv6Network` attributes.\n Fixes bsc#1226448 (CVE-2024-4032).\n - gh-102988: :func:`email.utils.getaddresses` and\n :func:`email.utils.parseaddr` now return ``(\u0027\u0027, \u0027\u0027)``\n 2-tuples in more situations where invalid email addresses\n are encountered instead of potentially inaccurate\n values. Add optional *strict* parameter to these two\n functions: use ``strict=False`` to get the old behavior,\n accept malformed inputs. ``getattr(email.utils,\n \u0027supports_strict_parsing\u0027, False)`` can be use to check if\n the *strict* paramater is available. Patch by Thomas Dwyer\n and Victor Stinner to improve the CVE-2023-27043 fix\n (bsc#1210638).\n - gh-67693: Fix :func:`urllib.parse.urlunparse` and\n :func:`urllib.parse.urlunsplit` for URIs with path starting\n with multiple slashes and no authority. Based on patch by\n Ashwin Ramaswami.\n - Core and Builtins\n - gh-112275: A deadlock involving ``pystate.c``\u0027s\n ``HEAD_LOCK`` in ``posixmodule.c`` at fork is now\n fixed. Patch by ChuBoning based on previous Python 3.12 fix\n by Victor Stinner.\n - gh-109120: Added handle of incorrect star expressions, e.g\n ``f(3, *)``. Patch by Grigoryev Semyon\n\n\n- CVE-2024-8088: Prevent malformed payload to cause infinite loops in\n zipfile.Path (bsc#1229704).\n\n- Make pip and modern tools install directly in /usr/local when used by the user.\n (bsc#1225660).\n \n- CVE-2024-4032: Fix rearranging definition of private v global IP addresses (bsc#1226448).\n\n- Update to 3.11.9:\n * Security\n - gh-115398: Allow controlling Expat \u003e=2.6.0 reparse deferral\n (CVE-2023-52425, bsc#1219559) by adding five new methods:\n xml.etree.ElementTree.XMLParser.flush()\n xml.etree.ElementTree.XMLPullParser.flush()\n xml.parsers.expat.xmlparser.GetReparseDeferralEnabled()\n xml.parsers.expat.xmlparser.SetReparseDeferralEnabled()\n xml.sax.expatreader.ExpatParser.flush()\n - gh-115399: Update bundled libexpat to 2.6.0\n - gh-115243: Fix possible crashes in collections.deque.index()\n when the deque is concurrently modified.\n - gh-114572: ssl.SSLContext.cert_store_stats() and\n ssl.SSLContext.get_ca_certs() now correctly lock access to the\n certificate store, when the ssl.SSLContext is shared across\n multiple threads (bsc#1226447, CVE-2024-0397).\n * Core and Builtins\n - gh-116296: Fix possible refleak in object.__reduce__() internal\n error handling.\n - gh-116034: Fix location of the error on a failed assertion.\n - gh-115823: Properly calculate error ranges in the parser when\n raising SyntaxError exceptions caused by invalid byte sequences.\n Patch by Pablo Galindo\n - gh-112087: For an empty reverse iterator for list will be\n reduced to reversed(). Patch by Donghee Na.\n - gh-115011: Setters for members with an unsigned integer type now\n support the same range of valid values for objects that has a\n __index__() method as for int.\n - gh-96497: Fix incorrect resolution of mangled class variables\n used in assignment expressions in comprehensions.\n * Library\n - gh-117310: Fixed an unlikely early \u0026 extra Py_DECREF triggered\n crash in ssl when creating a new _ssl._SSLContext if CPython was\n built implausibly such that the default cipher list is empty or\n the SSL library it was linked against reports a failure from its\n C SSL_CTX_set_cipher_list() API.\n - gh-117178: Fix regression in lazy loading of self-referential\n modules, introduced in gh-114781.\n - gh-117084: Fix zipfile extraction for directory entries with the\n name containing backslashes on Windows.\n - gh-117110: Fix a bug that prevents subclasses of typing.Any to\n be instantiated with arguments. Patch by Chris Fu.\n - gh-90872: On Windows, subprocess.Popen.wait() no longer calls\n WaitForSingleObject() with a negative timeout: pass 0 ms if the\n timeout is negative. Patch by Victor Stinner.\n - gh-116957: configparser: Don\u2019t leave ConfigParser values in an\n invalid state (stored as a list instead of a str) after an\n earlier read raised DuplicateSectionError or\n DuplicateOptionError.\n - gh-90095: Ignore empty lines and comments in .pdbrc\n - gh-116764: Restore support of None and other false values in\n urllib.parse functions parse_qs() and parse_qsl(). Also, they\n now raise a TypeError for non-zero integers and non-empty\n sequences.\n - gh-116811: In PathFinder.invalidate_caches, delegate to\n MetadataPathFinder.invalidate_caches.\n - gh-116600: Fix repr() for global Flag members.\n - gh-116484: Change automatically generated tkinter.Checkbutton\n widget names to avoid collisions with automatically generated\n tkinter.ttk.Checkbutton widget names within the same parent\n widget.\n - gh-116401: Fix blocking os.fwalk() and shutil.rmtree() on\n opening named pipe.\n - gh-116143: Fix a race in pydoc _start_server, eliminating a\n window in which _start_server can return a thread that is\n \u201cserving\u201d but without a docserver set.\n - gh-116325: typing: raise SyntaxError instead of AttributeError\n on forward references as empty strings.\n - gh-90535: Fix support of interval values \u003e 1 in\n logging.TimedRotatingFileHandler for when=\u0027MIDNIGHT\u0027 and\n when=\u0027Wx\u0027.\n - gh-115978: Disable preadv(), readv(), pwritev(), and writev() on\n WASI.\n - Under wasmtime for WASI 0.2, these functions don\u2019t pass\n test_posix\n (https://github.com/bytecodealliance/wasmtime/issues/7830).\n - gh-88352: Fix the computation of the next rollover time in the\n logging.TimedRotatingFileHandler handler. computeRollover() now\n always returns a timestamp larger than the specified time and\n works correctly during the DST change. doRollover() no longer\n overwrite the already rolled over file, saving from data loss\n when run at midnight or during repeated time at the DST change.\n - gh-87115: Set __main__.__spec__ to None when running a script\n with pdb\n - gh-76511: Fix UnicodeEncodeError in email.Message.as_string()\n that results when a message that claims to be in the ascii\n character set actually has non-ascii characters. Non-ascii\n characters are now replaced with the U+FFFD replacement\n character, like in the replace error handler.\n - gh-75988: Fixed unittest.mock.create_autospec() to pass the call\n through to the wrapped object to return the real result.\n - gh-115881: Fix issue where ast.parse() would incorrectly flag\n conditional context managers (such as with (x() if y else z()):\n ...) as invalid syntax if feature_version=(3, 8) was passed.\n This reverts changes to the grammar made as part of gh-94949.\n - gh-115886: Fix silent truncation of the name with an embedded\n null character in multiprocessing.shared_memory.SharedMemory.\n - gh-115809: Improve algorithm for computing which rolled-over log\n files to delete in logging.TimedRotatingFileHandler. It is now\n reliable for handlers without namer and with arbitrary\n deterministic namer that leaves the datetime part in the file\n name unmodified.\n - gh-74668: urllib.parse functions parse_qs() and parse_qsl() now\n support bytes arguments containing raw and percent-encoded\n non-ASCII data.\n - gh-67044: csv.writer() now always quotes or escapes \u0027\\r\u0027 and\n \u0027\\n\u0027, regardless of lineterminator value.\n - gh-115712: csv.writer() now quotes empty fields if delimiter is\n a space and skipinitialspace is true and raises exception if\n quoting is not possible.\n - gh-115618: Fix improper decreasing the reference count for None\n argument in property methods getter(), setter() and deleter().\n - gh-115570: A DeprecationWarning is no longer omitted on access\n to the __doc__ attributes of the deprecated typing.io and\n typing.re pseudo-modules.\n - gh-112006: Fix inspect.unwrap() for types with the __wrapper__\n data descriptor.\n - gh-101293: Support callables with the __call__() method and\n types with __new__() and __init__() methods set to class\n methods, static methods, bound methods, partial functions, and\n other types of methods and descriptors in\n inspect.Signature.from_callable().\n - gh-115392: Fix a bug in doctest where incorrect line numbers\n would be reported for decorated functions.\n - gh-114563: Fix several format() bugs when using the C\n implementation of Decimal: * memory leak in some rare cases when\n using the z format option (coerce negative 0) * incorrect output\n when applying the z format option to type F (fixed-point with\n capital NAN / INF) * incorrect output when applying the # format\n option (alternate form)\n - gh-115197: urllib.request no longer resolves the hostname before\n checking it against the system\u2019s proxy bypass list on macOS and\n Windows.\n - gh-115198: Fix support of Docutils \u003e= 0.19 in distutils.\n - gh-115165: Most exceptions are now ignored when attempting to\n set the __orig_class__ attribute on objects returned when\n calling typing generic aliases (including generic aliases\n created using typing.Annotated). Previously only AttributeError\n was ignored. Patch by Dave Shawley.\n - gh-115133: Fix tests for XMLPullParser with Expat 2.6.0.\n - gh-115059: io.BufferedRandom.read1() now flushes the underlying\n write buffer.\n - gh-79382: Trailing ** no longer allows to match files and\n non-existing paths in recursive glob().\n - gh-114763: Protect modules loaded with importlib.util.LazyLoader\n from race conditions when multiple threads try to access\n attributes before the loading is complete.\n - gh-97959: Fix rendering class methods, bound methods, method and\n function aliases in pydoc. Class methods no longer have \u201cmethod\n of builtins.type instance\u201d note. Corresponding notes are now\n added for class and unbound methods. Method and function aliases\n now have references to the module or the class where the origin\n was defined if it differs from the current. Bound methods are\n now listed in the static methods section. Methods of builtin\n classes are now supported as well as methods of Python classes.\n - gh-112281: Allow creating union of types for typing.Annotated\n with unhashable metadata.\n - gh-111775: Fix importlib.resources.simple.ResourceHandle.open()\n for text mode, added missed stream argument.\n - gh-90095: Make .pdbrc and -c work with any valid pdb commands.\n - gh-107155: Fix incorrect output of help(x) where x is a lambda\n function, which has an __annotations__ dictionary attribute with\n a \"return\" key.\n - gh-105866: Fixed _get_slots bug which caused error when defining\n dataclasses with slots and a weakref_slot.\n - gh-60346: Fix ArgumentParser inconsistent with parse_known_args.\n - gh-100985: Update HTTPSConnection to consistently wrap IPv6\n Addresses when using a proxy.\n - gh-100884: email: fix misfolding of comma in address-lists\n over multiple lines in combination with unicode encoding\n (bsc#1238450 CVE-2025-1795)\n - gh-95782: Fix io.BufferedReader.tell(),\n io.BufferedReader.seek(), _pyio.BufferedReader.tell(),\n io.BufferedRandom.tell(), io.BufferedRandom.seek() and\n _pyio.BufferedRandom.tell() being able to return negative\n offsets.\n - gh-96310: Fix a traceback in argparse when all options in a\n mutually exclusive group are suppressed.\n - gh-93205: Fixed a bug in\n logging.handlers.TimedRotatingFileHandler where multiple\n rotating handler instances pointing to files with the same name\n but different extensions would conflict and not delete the\n correct files.\n - bpo-44865: Add missing call to localization function in\n argparse.\n - bpo-43952: Fix multiprocessing.connection.Listener.accept() to\n accept empty bytes as authkey. Not accepting empty bytes as key\n causes it to hang indefinitely.\n - bpo-42125: linecache: get module name from __spec__ if\n available. This allows getting source code for the __main__\n module when a custom loader is used.\n - gh-66543: Make mimetypes.guess_type() properly parsing of URLs\n with only a host name, URLs containing fragment or query, and\n filenames with only a UNC sharepoint on Windows. Based on patch\n by Dong-hee Na.\n - bpo-33775: Add \u2018default\u2019 and \u2018version\u2019 help text for\n localization in argparse.\n * Documentation\n - gh-115399: Document CVE-2023-52425 of Expat \u003c2.6.0 under \u201cXML\n vulnerabilities\u201d.\n - gh-115233: Fix an example for LoggerAdapter in the Logging\n Cookbook.\n * Tests\n - gh-83434: Disable JUnit XML output (--junit-xml=FILE command\n line option) in regrtest when hunting for reference leaks (-R\n option). Patch by Victor Stinner.\n - gh-117187: Fix XML tests for vanilla Expat \u003c2.6.0.\n - gh-115979: Update test_importlib so that it passes under WASI\n SDK 21.\n - gh-116307: Added import helper isolated_modules as CleanImport\n does not remove modules imported during the context.\n - gh-115720: Leak tests (-R, --huntrleaks) now show a summary of\n the number of leaks found in each iteration.\n - gh-115122: Add --bisect option to regrtest test runner: run\n failed tests with test.bisect_cmd to identify failing tests.\n Patch by Victor Stinner.\n - gh-115596: Fix ProgramPriorityTests in test_os permanently\n changing the process priority.\n - gh-115198: Fix test_check_metadata_deprecate in distutils tests\n with a newer Docutils.\n * Build\n - gh-116313: Get WASI builds to work under wasmtime 18 w/ WASI\n 0.2/preview2 primitives.\n - gh-115167: Avoid vendoring vcruntime140_threads.dll when\n building with Visual Studio 2022 version 17.8.\n * Windows\n - gh-116773: Fix instances of \u003c_overlapped.Overlapped object at\n 0xXXX\u003e still has pending operation at deallocation, the process\n may crash.\n - gh-91227: Fix the asyncio ProactorEventLoop implementation so\n that sending a datagram to an address that is not listening does\n not prevent receiving any more datagrams.\n - gh-115554: The installer now has more strict rules about\n updating the Python Launcher for Windows. In general, most users\n only have a single launcher installed and will see no\n difference. When multiple launchers have been installed, the\n option to install the launcher is disabled until all but one\n have been removed. Downgrading the launcher (which was never\n allowed) is now more obviously blocked.\n - gh-115543: Python Launcher for Windows can now detect Python\n 3.13 when installed from the Microsoft Store, and will install\n Python 3.12 by default when PYLAUNCHER_ALLOW_INSTALL is set.\n - gh-115009: Update Windows installer to use SQLite 3.45.1.\n * IDLE\n - gh-88516: On macOS show a proxy icon in the title bar of editor\n windows to match platform behaviour.\n * Tools/Demos\n - gh-113516: Don\u2019t set LDSHARED when building for WASI.\n * C API\n - gh-117021: Fix integer overflow in PyLong_AsPid() on non-Windows\n 64-bit platforms.\n\n- Add reference to CVE-2024-0450 (bsc#1221854) to changelog.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-253",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20154-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20154-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520154-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20154-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html"
},
{
"category": "self",
"summary": "SUSE Bug 1174091",
"url": "https://bugzilla.suse.com/1174091"
},
{
"category": "self",
"summary": "SUSE Bug 1210638",
"url": "https://bugzilla.suse.com/1210638"
},
{
"category": "self",
"summary": "SUSE Bug 1219559",
"url": "https://bugzilla.suse.com/1219559"
},
{
"category": "self",
"summary": "SUSE Bug 1219666",
"url": "https://bugzilla.suse.com/1219666"
},
{
"category": "self",
"summary": "SUSE Bug 1221854",
"url": "https://bugzilla.suse.com/1221854"
},
{
"category": "self",
"summary": "SUSE Bug 1225660",
"url": "https://bugzilla.suse.com/1225660"
},
{
"category": "self",
"summary": "SUSE Bug 1226447",
"url": "https://bugzilla.suse.com/1226447"
},
{
"category": "self",
"summary": "SUSE Bug 1226448",
"url": "https://bugzilla.suse.com/1226448"
},
{
"category": "self",
"summary": "SUSE Bug 1227378",
"url": "https://bugzilla.suse.com/1227378"
},
{
"category": "self",
"summary": "SUSE Bug 1227999",
"url": "https://bugzilla.suse.com/1227999"
},
{
"category": "self",
"summary": "SUSE Bug 1228165",
"url": "https://bugzilla.suse.com/1228165"
},
{
"category": "self",
"summary": "SUSE Bug 1228780",
"url": "https://bugzilla.suse.com/1228780"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1229704",
"url": "https://bugzilla.suse.com/1229704"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE Bug 1230906",
"url": "https://bugzilla.suse.com/1230906"
},
{
"category": "self",
"summary": "SUSE Bug 1231795",
"url": "https://bugzilla.suse.com/1231795"
},
{
"category": "self",
"summary": "SUSE Bug 1232241",
"url": "https://bugzilla.suse.com/1232241"
},
{
"category": "self",
"summary": "SUSE Bug 1236705",
"url": "https://bugzilla.suse.com/1236705"
},
{
"category": "self",
"summary": "SUSE Bug 1238450",
"url": "https://bugzilla.suse.com/1238450"
},
{
"category": "self",
"summary": "SUSE Bug 1239210",
"url": "https://bugzilla.suse.com/1239210"
},
{
"category": "self",
"summary": "SUSE Bug 831629",
"url": "https://bugzilla.suse.com/831629"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-25236 page",
"url": "https://www.suse.com/security/cve/CVE-2022-25236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-27043 page",
"url": "https://www.suse.com/security/cve/CVE-2023-27043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52425 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6597 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0397 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0397/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0450 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4032 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-9287 page",
"url": "https://www.suse.com/security/cve/CVE-2024-9287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-0938 page",
"url": "https://www.suse.com/security/cve/CVE-2025-0938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-1795 page",
"url": "https://www.suse.com/security/cve/CVE-2025-1795/"
}
],
"title": "Security update for python311",
"tracking": {
"current_release_date": "2025-03-19T11:31:40Z",
"generator": {
"date": "2025-03-19T11:31:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20154-1",
"initial_release_date": "2025-03-19T11:31:40Z",
"revision_history": [
{
"date": "2025-03-19T11:31:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.11-1.1.aarch64",
"product": {
"name": "libpython3_11-1_0-3.11.11-1.1.aarch64",
"product_id": "libpython3_11-1_0-3.11.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-3.11.11-1.1.aarch64",
"product": {
"name": "python311-3.11.11-1.1.aarch64",
"product_id": "python311-3.11.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.11-1.1.aarch64",
"product": {
"name": "python311-base-3.11.11-1.1.aarch64",
"product_id": "python311-base-3.11.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.11-1.1.aarch64",
"product": {
"name": "python311-curses-3.11.11-1.1.aarch64",
"product_id": "python311-curses-3.11.11-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.11-1.1.s390x",
"product": {
"name": "libpython3_11-1_0-3.11.11-1.1.s390x",
"product_id": "libpython3_11-1_0-3.11.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-3.11.11-1.1.s390x",
"product": {
"name": "python311-3.11.11-1.1.s390x",
"product_id": "python311-3.11.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.11-1.1.s390x",
"product": {
"name": "python311-base-3.11.11-1.1.s390x",
"product_id": "python311-base-3.11.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.11-1.1.s390x",
"product": {
"name": "python311-curses-3.11.11-1.1.s390x",
"product_id": "python311-curses-3.11.11-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.11-1.1.x86_64",
"product": {
"name": "libpython3_11-1_0-3.11.11-1.1.x86_64",
"product_id": "libpython3_11-1_0-3.11.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-3.11.11-1.1.x86_64",
"product": {
"name": "python311-3.11.11-1.1.x86_64",
"product_id": "python311-3.11.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.11-1.1.x86_64",
"product": {
"name": "python311-base-3.11.11-1.1.x86_64",
"product_id": "python311-base-3.11.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.11-1.1.x86_64",
"product": {
"name": "python311-curses-3.11.11-1.1.x86_64",
"product_id": "python311-curses-3.11.11-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.11-1.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.11-1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.11-1.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.11-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.11-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.11-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.11-1.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64"
},
"product_reference": "python311-3.11.11-1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.11-1.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x"
},
"product_reference": "python311-3.11.11-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.11-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64"
},
"product_reference": "python311-3.11.11-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.11-1.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64"
},
"product_reference": "python311-base-3.11.11-1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.11-1.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x"
},
"product_reference": "python311-base-3.11.11-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.11-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64"
},
"product_reference": "python311-base-3.11.11-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.11-1.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64"
},
"product_reference": "python311-curses-3.11.11-1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.11-1.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x"
},
"product_reference": "python311-curses-3.11.11-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.11-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
},
"product_reference": "python311-curses-3.11.11-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2022-25236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-25236"
}
],
"notes": [
{
"category": "general",
"text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-25236",
"url": "https://www.suse.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "SUSE Bug 1196025 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196025"
},
{
"category": "external",
"summary": "SUSE Bug 1196784 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196784"
},
{
"category": "external",
"summary": "SUSE Bug 1197217 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1197217"
},
{
"category": "external",
"summary": "SUSE Bug 1200038 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1200038"
},
{
"category": "external",
"summary": "SUSE Bug 1201735 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1201735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "important"
}
],
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2023-27043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-27043"
}
],
"notes": [
{
"category": "general",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-27043",
"url": "https://www.suse.com/security/cve/CVE-2023-27043"
},
{
"category": "external",
"summary": "SUSE Bug 1210638 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1210638"
},
{
"category": "external",
"summary": "SUSE Bug 1222537 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1222537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-52425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52425"
}
],
"notes": [
{
"category": "general",
"text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52425",
"url": "https://www.suse.com/security/cve/CVE-2023-52425"
},
{
"category": "external",
"summary": "SUSE Bug 1219559 for CVE-2023-52425",
"url": "https://bugzilla.suse.com/1219559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-6597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6597"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.\n\nThe tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6597",
"url": "https://www.suse.com/security/cve/CVE-2023-6597"
},
{
"category": "external",
"summary": "SUSE Bug 1219666 for CVE-2023-6597",
"url": "https://bugzilla.suse.com/1219666"
},
{
"category": "external",
"summary": "SUSE Bug 1221854 for CVE-2023-6597",
"url": "https://bugzilla.suse.com/1221854"
},
{
"category": "external",
"summary": "SUSE Bug 1224879 for CVE-2023-6597",
"url": "https://bugzilla.suse.com/1224879"
},
{
"category": "external",
"summary": "SUSE Bug 1225185 for CVE-2023-6597",
"url": "https://bugzilla.suse.com/1225185"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "important"
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2024-0397",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0397"
}
],
"notes": [
{
"category": "general",
"text": "A defect was discovered in the Python \"ssl\" module where there is a memory\nrace condition with the ssl.SSLContext methods \"cert_store_stats()\" and\n\"get_ca_certs()\". The race condition can be triggered if the methods are\ncalled at the same time as certificates are loaded into the SSLContext,\nsuch as during the TLS handshake with a certificate directory configured.\nThis issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0397",
"url": "https://www.suse.com/security/cve/CVE-2024-0397"
},
{
"category": "external",
"summary": "SUSE Bug 1226447 for CVE-2024-0397",
"url": "https://bugzilla.suse.com/1226447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0450"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.\n\nThe zipfile module is vulnerable to \"quoted-overlap\" zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0450",
"url": "https://www.suse.com/security/cve/CVE-2024-0450"
},
{
"category": "external",
"summary": "SUSE Bug 1221854 for CVE-2024-0450",
"url": "https://bugzilla.suse.com/1221854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4032"
}
],
"notes": [
{
"category": "general",
"text": "The \"ipaddress\" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \"globally reachable\" or \"private\". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn\u0027t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.\n\nCPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4032",
"url": "https://www.suse.com/security/cve/CVE-2024-4032"
},
{
"category": "external",
"summary": "SUSE Bug 1226448 for CVE-2024-4032",
"url": "https://bugzilla.suse.com/1226448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "low"
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6923"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u0027t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6923",
"url": "https://www.suse.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "SUSE Bug 1228780 for CVE-2024-6923",
"url": "https://bugzilla.suse.com/1228780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "important"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
},
{
"cve": "CVE-2024-9287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-9287"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment \"activation\" scripts (ie \"source venv/bin/activate\"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren\u0027t activated before being used (ie \"./venv/bin/python\") are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-9287",
"url": "https://www.suse.com/security/cve/CVE-2024-9287"
},
{
"category": "external",
"summary": "SUSE Bug 1232241 for CVE-2024-9287",
"url": "https://bugzilla.suse.com/1232241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2024-9287"
},
{
"cve": "CVE-2025-0938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-0938"
}
],
"notes": [
{
"category": "general",
"text": "The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn\u0027t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-0938",
"url": "https://www.suse.com/security/cve/CVE-2025-0938"
},
{
"category": "external",
"summary": "SUSE Bug 1236705 for CVE-2025-0938",
"url": "https://bugzilla.suse.com/1236705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-0938"
},
{
"cve": "CVE-2025-1795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-1795"
}
],
"notes": [
{
"category": "general",
"text": "During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-1795",
"url": "https://www.suse.com/security/cve/CVE-2025-1795"
},
{
"category": "external",
"summary": "SUSE Bug 1238450 for CVE-2025-1795",
"url": "https://bugzilla.suse.com/1238450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:libpython3_11-1_0-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-base-3.11.11-1.1.x86_64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.aarch64",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.s390x",
"SUSE Linux Micro 6.0:python311-curses-3.11.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-03-19T11:31:40Z",
"details": "low"
}
],
"title": "CVE-2025-1795"
}
]
}
SUSE-SU-2024:3418-1
Vulnerability from csaf_suse - Published: 2024-09-24 13:38 - Updated: 2024-09-24 13:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python311",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python311 fixes the following issues:\n\n- Update python311 to version 3.11.10.\n- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)\n- CVE-2024-7592: quadratic algorithm used when parsing cookies leads to excessive resource consumption. (bsc#1229596)\n- CVE-2024-8088: lack of name validation when extracting a zip archive leads to infinite loops. (bsc#1229704)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3418,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3418,SUSE-SLE-Module-Python3-15-SP5-2024-3418,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3418,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3418,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3418,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3418,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3418,openSUSE-SLE-15.5-2024-3418",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3418-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3418-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243418-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3418-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019511.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229596",
"url": "https://bugzilla.suse.com/1229596"
},
{
"category": "self",
"summary": "SUSE Bug 1229704",
"url": "https://bugzilla.suse.com/1229704"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
}
],
"title": "Security update for python311",
"tracking": {
"current_release_date": "2024-09-24T13:38:59Z",
"generator": {
"date": "2024-09-24T13:38:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3418-1",
"initial_release_date": "2024-09-24T13:38:59Z",
"revision_history": [
{
"date": "2024-09-24T13:38:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"product_id": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-base-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-base-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-curses-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-curses-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-dbm-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-dbm-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-devel-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-devel-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-doc-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-doc-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-idle-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-idle-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-testsuite-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-tk-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-tk-3.11.10-150400.9.35.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150400.9.35.1.aarch64",
"product": {
"name": "python311-tools-3.11.10-150400.9.35.1.aarch64",
"product_id": "python311-tools-3.11.10-150400.9.35.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-64bit-3.11.10-150400.9.35.1.aarch64_ilp32",
"product": {
"name": "libpython3_11-1_0-64bit-3.11.10-150400.9.35.1.aarch64_ilp32",
"product_id": "libpython3_11-1_0-64bit-3.11.10-150400.9.35.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python311-64bit-3.11.10-150400.9.35.1.aarch64_ilp32",
"product": {
"name": "python311-64bit-3.11.10-150400.9.35.1.aarch64_ilp32",
"product_id": "python311-64bit-3.11.10-150400.9.35.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "python311-base-64bit-3.11.10-150400.9.35.1.aarch64_ilp32",
"product": {
"name": "python311-base-64bit-3.11.10-150400.9.35.1.aarch64_ilp32",
"product_id": "python311-base-64bit-3.11.10-150400.9.35.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.i586",
"product": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.i586",
"product_id": "libpython3_11-1_0-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-3.11.10-150400.9.35.1.i586",
"product_id": "python311-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-base-3.11.10-150400.9.35.1.i586",
"product_id": "python311-base-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-curses-3.11.10-150400.9.35.1.i586",
"product_id": "python311-curses-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-dbm-3.11.10-150400.9.35.1.i586",
"product_id": "python311-dbm-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-devel-3.11.10-150400.9.35.1.i586",
"product_id": "python311-devel-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-doc-3.11.10-150400.9.35.1.i586",
"product_id": "python311-doc-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.i586",
"product_id": "python311-doc-devhelp-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-idle-3.11.10-150400.9.35.1.i586",
"product_id": "python311-idle-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.i586",
"product_id": "python311-testsuite-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-tk-3.11.10-150400.9.35.1.i586",
"product_id": "python311-tk-3.11.10-150400.9.35.1.i586"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150400.9.35.1.i586",
"product": {
"name": "python311-tools-3.11.10-150400.9.35.1.i586",
"product_id": "python311-tools-3.11.10-150400.9.35.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"product_id": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-base-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-base-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-curses-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-curses-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-dbm-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-devel-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-devel-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-doc-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-doc-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-idle-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-idle-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-testsuite-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-tk-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-tk-3.11.10-150400.9.35.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150400.9.35.1.ppc64le",
"product": {
"name": "python311-tools-3.11.10-150400.9.35.1.ppc64le",
"product_id": "python311-tools-3.11.10-150400.9.35.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"product_id": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-base-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-base-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-curses-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-curses-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-dbm-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-dbm-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-devel-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-devel-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-doc-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-doc-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-idle-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-idle-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-testsuite-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-tk-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-tk-3.11.10-150400.9.35.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150400.9.35.1.s390x",
"product": {
"name": "python311-tools-3.11.10-150400.9.35.1.s390x",
"product_id": "python311-tools-3.11.10-150400.9.35.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"product_id": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"product_id": "libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-32bit-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-32bit-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-base-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-base-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-base-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-base-32bit-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-curses-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-curses-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-dbm-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-dbm-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-devel-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-devel-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-devel-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-doc-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-doc-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-doc-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-idle-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-idle-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-testsuite-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-tk-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-tk-3.11.10-150400.9.35.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-tools-3.11.10-150400.9.35.1.x86_64",
"product": {
"name": "python311-tools-3.11.10-150400.9.35.1.x86_64",
"product_id": "python311-tools-3.11.10-150400.9.35.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-32bit-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-base-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-base-32bit-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-curses-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-dbm-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-devel-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-devel-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-idle-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-testsuite-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-testsuite-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tk-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tools-3.11.10-150400.9.35.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
},
"product_reference": "python311-tools-3.11.10-150400.9.35.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T13:38:59Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T13:38:59Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-tools-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-base-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-curses-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-devel-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-idle-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tk-3.11.10-150400.9.35.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-tools-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:libpython3_11-1_0-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:libpython3_11-1_0-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-base-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-base-32bit-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-curses-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-dbm-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-devel-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-doc-devhelp-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-idle-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-testsuite-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tk-3.11.10-150400.9.35.1.x86_64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.aarch64",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.ppc64le",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.s390x",
"openSUSE Leap 15.5:python311-tools-3.11.10-150400.9.35.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-24T13:38:59Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
}
]
}
SUSE-SU-2024:3447-1
Vulnerability from csaf_suse - Published: 2024-09-26 06:16 - Updated: 2024-09-26 06:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python36",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python36 fixes the following issues:\n\n- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3447,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3447,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3447,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3447,SUSE-SUSE-MicroOS-5.1-2024-3447",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3447-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3447-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243447-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3447-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019530.html"
},
{
"category": "self",
"summary": "SUSE Bug 1230227",
"url": "https://bugzilla.suse.com/1230227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
}
],
"title": "Security update for python36",
"tracking": {
"current_release_date": "2024-09-26T06:16:33Z",
"generator": {
"date": "2024-09-26T06:16:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3447-1",
"initial_release_date": "2024-09-26T06:16:33Z",
"revision_history": [
{
"date": "2024-09-26T06:16:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"product_id": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-base-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-base-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-curses-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-curses-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-dbm-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-dbm-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-devel-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-devel-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-doc-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-doc-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-doc-devhelp-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-idle-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-idle-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-testsuite-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-testsuite-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-tk-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-tk-3.6.15-150000.3.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150000.3.161.1.aarch64",
"product": {
"name": "python3-tools-3.6.15-150000.3.161.1.aarch64",
"product_id": "python3-tools-3.6.15-150000.3.161.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-64bit-3.6.15-150000.3.161.1.aarch64_ilp32",
"product": {
"name": "libpython3_6m1_0-64bit-3.6.15-150000.3.161.1.aarch64_ilp32",
"product_id": "libpython3_6m1_0-64bit-3.6.15-150000.3.161.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.i586",
"product": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.i586",
"product_id": "libpython3_6m1_0-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-3.6.15-150000.3.161.1.i586",
"product_id": "python3-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-base-3.6.15-150000.3.161.1.i586",
"product_id": "python3-base-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-curses-3.6.15-150000.3.161.1.i586",
"product_id": "python3-curses-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-dbm-3.6.15-150000.3.161.1.i586",
"product_id": "python3-dbm-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-devel-3.6.15-150000.3.161.1.i586",
"product_id": "python3-devel-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-doc-3.6.15-150000.3.161.1.i586",
"product_id": "python3-doc-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.i586",
"product_id": "python3-doc-devhelp-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-idle-3.6.15-150000.3.161.1.i586",
"product_id": "python3-idle-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-testsuite-3.6.15-150000.3.161.1.i586",
"product_id": "python3-testsuite-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-tk-3.6.15-150000.3.161.1.i586",
"product_id": "python3-tk-3.6.15-150000.3.161.1.i586"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150000.3.161.1.i586",
"product": {
"name": "python3-tools-3.6.15-150000.3.161.1.i586",
"product_id": "python3-tools-3.6.15-150000.3.161.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"product_id": "libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-base-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-base-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-curses-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-curses-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-dbm-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-devel-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-devel-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-doc-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-doc-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-doc-devhelp-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-idle-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-idle-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-testsuite-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-testsuite-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-tk-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-tk-3.6.15-150000.3.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150000.3.161.1.ppc64le",
"product": {
"name": "python3-tools-3.6.15-150000.3.161.1.ppc64le",
"product_id": "python3-tools-3.6.15-150000.3.161.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"product_id": "libpython3_6m1_0-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-base-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-base-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-curses-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-curses-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-dbm-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-dbm-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-devel-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-devel-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-doc-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-doc-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-doc-devhelp-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-idle-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-idle-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-testsuite-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-testsuite-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-tk-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-tk-3.6.15-150000.3.161.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150000.3.161.1.s390x",
"product": {
"name": "python3-tools-3.6.15-150000.3.161.1.s390x",
"product_id": "python3-tools-3.6.15-150000.3.161.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"product_id": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpython3_6m1_0-32bit-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "libpython3_6m1_0-32bit-3.6.15-150000.3.161.1.x86_64",
"product_id": "libpython3_6m1_0-32bit-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-base-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-base-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-base-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-curses-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-curses-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-curses-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-dbm-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-dbm-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-dbm-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-devel-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-devel-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-devel-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-doc-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-doc-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-doc-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-doc-devhelp-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-doc-devhelp-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-idle-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-idle-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-idle-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-testsuite-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-testsuite-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-testsuite-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tk-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-tk-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-tk-3.6.15-150000.3.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-tools-3.6.15-150000.3.161.1.x86_64",
"product": {
"name": "python3-tools-3.6.15-150000.3.161.1.x86_64",
"product_id": "python3-tools-3.6.15-150000.3.161.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-curses-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-curses-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-dbm-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-dbm-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-devel-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-devel-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-idle-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-idle-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-tk-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-tk-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-tools-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-tools-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-base-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-base-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-curses-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-curses-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-curses-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-curses-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-curses-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-dbm-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-dbm-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-dbm-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-dbm-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-devel-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-devel-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-devel-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-devel-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-devel-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-idle-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-idle-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-idle-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-idle-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-idle-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tk-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-tk-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tk-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tk-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-tk-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150000.3.161.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tools-3.6.15-150000.3.161.1.ppc64le"
},
"product_reference": "python3-tools-3.6.15-150000.3.161.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-tools-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tools-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-tools-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.aarch64"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.s390x"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-base-3.6.15-150000.3.161.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.x86_64"
},
"product_reference": "python3-base-3.6.15-150000.3.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-base-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-curses-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-devel-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-idle-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tk-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tools-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tools-3.6.15-150000.3.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-base-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-curses-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-devel-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-idle-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tk-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tools-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tools-3.6.15-150000.3.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:python3-tools-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpython3_6m1_0-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libpython3_6m1_0-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-base-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-base-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-curses-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-curses-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-dbm-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-dbm-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-devel-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-devel-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-idle-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-idle-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tk-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tk-3.6.15-150000.3.161.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tools-3.6.15-150000.3.161.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:python3-tools-3.6.15-150000.3.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-26T06:16:33Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
}
]
}
SSA-202008
Vulnerability from csaf_siemens - Published: 2025-12-09 00:00 - Updated: 2025-12-09 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Ruggedcom ROX familly contain multiple vulnerabilities before V2.17.0\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-202008.html"
},
{
"category": "self",
"summary": "SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-202008.json"
}
],
"title": "SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0",
"tracking": {
"current_release_date": "2025-12-09T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-202008",
"initial_release_date": "2025-12-09T00:00:00Z",
"revision_history": [
{
"date": "2025-12-09T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX MX5000",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX MX5000RE",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX MX5000RE"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1400",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1500",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1501",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1501"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1510",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1510"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1511",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1511"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1512",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1512"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1524",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1524"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX1536",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX1536"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c2.17.0",
"product": {
"name": "RUGGEDCOM ROX RX5000",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX RX5000"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7169",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used \"group blacklisting\" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2018-7169"
},
{
"cve": "CVE-2018-9234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2018-9234"
},
{
"cve": "CVE-2018-12934",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2018-12934"
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2019-9893",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "summary",
"text": "libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2019-9893"
},
{
"cve": "CVE-2019-12900",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2019-12900"
},
{
"cve": "CVE-2019-14866",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2019-14866"
},
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-21047",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2020-21047"
},
{
"cve": "CVE-2020-22217",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "summary",
"text": "Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2020-22217"
},
{
"cve": "CVE-2020-35525",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2020-35525"
},
{
"cve": "CVE-2021-35550",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35550"
},
{
"cve": "CVE-2021-35556",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35556"
},
{
"cve": "CVE-2021-35559",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35559"
},
{
"cve": "CVE-2021-35561",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35561"
},
{
"cve": "CVE-2021-35564",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35564"
},
{
"cve": "CVE-2021-35565",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35565"
},
{
"cve": "CVE-2021-35567",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35567"
},
{
"cve": "CVE-2021-35578",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35578"
},
{
"cve": "CVE-2021-35586",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35586"
},
{
"cve": "CVE-2021-35588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35588"
},
{
"cve": "CVE-2021-35603",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-35603"
},
{
"cve": "CVE-2021-36084",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-36084"
},
{
"cve": "CVE-2021-36085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-36085"
},
{
"cve": "CVE-2021-36086",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-36086"
},
{
"cve": "CVE-2021-36087",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-36087"
},
{
"cve": "CVE-2021-38185",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-38185"
},
{
"cve": "CVE-2021-47358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nstaging: greybus: uart: fix tty use after free\r\n\r\nUser space can hold a tty open indefinitely and tty drivers must not\r\nrelease the underlying structures until the last user is gone.\r\n\r\nSwitch to using the tty-port reference counter to manage the life time\r\nof the greybus tty state to avoid use after free after a disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-47358"
},
{
"cve": "CVE-2021-47361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmcb: fix error handling in mcb_alloc_bus()\r\n\r\nThere are two bugs:\r\n1) If ida_simple_get() fails then this code calls put_device(carrier)\r\n but we haven\u0027t yet called get_device(carrier) and probably that\r\n leads to a use after free.\r\n2) After device_initialize() then we need to use put_device() to\r\n release the bus. This will free the internal resources tied to the\r\n device and call mcb_free_bus() which will free the rest.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2021-47361"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-0492"
},
{
"cve": "CVE-2022-0847",
"cwe": {
"id": "CWE-281",
"name": "Improper Preservation of Permissions"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-0850"
},
{
"cve": "CVE-2022-1353",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1734",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "summary",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3424",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-20141",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-23039",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-23039"
},
{
"cve": "CVE-2022-23040",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Linux PV device frontends vulnerable to attacks by backends [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn\u0027t check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-23040"
},
{
"cve": "CVE-2022-24958",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-24958"
},
{
"cve": "CVE-2022-27223",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-27223"
},
{
"cve": "CVE-2022-28390",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-34903",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim\u0027s keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-37032",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-37032"
},
{
"cve": "CVE-2022-37434",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-41858",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-48624",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48624"
},
{
"cve": "CVE-2022-48626",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmoxart: fix potential use-after-free on remove path\r\n\r\nIt was reported that the mmc host structure could be accessed after it\r\nwas freed in moxart_remove(), so fix this by saving the base register of\r\nthe device and using it instead of the pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48626"
},
{
"cve": "CVE-2022-48919",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncifs: fix double free race when mount fails in cifs_get_root()\r\n\r\nWhen cifs_get_root() fails during cifs_smb3_do_mount() we call\r\ndeactivate_locked_super() which eventually will call delayed_free() which\r\nwill free the context.\r\nIn this situation we should not proceed to enter the out: section in\r\ncifs_smb3_do_mount() and free the same resources a second time.\r\n\r\n[Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60\r\n[Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0\r\n\r\n[Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G OE 5.17.0-rc3+ #4\r\n[Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019\r\n[Thu Feb 10 12:59:06 2022] Call Trace:\r\n[Thu Feb 10 12:59:06 2022] \u003cIRQ\u003e\r\n[Thu Feb 10 12:59:06 2022] dump_stack_lvl+0x5d/0x78\r\n[Thu Feb 10 12:59:06 2022] print_address_description.constprop.0+0x24/0x150\r\n[Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60\r\n[Thu Feb 10 12:59:06 2022] kasan_report.cold+0x7d/0x117\r\n[Thu Feb 10 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60\r\n[Thu Feb 10 12:59:06 2022] __asan_load8+0x86/0xa0\r\n[Thu Feb 10 12:59:06 2022] rcu_cblist_dequeue+0x32/0x60\r\n[Thu Feb 10 12:59:06 2022] rcu_core+0x547/0xca0\r\n[Thu Feb 10 12:59:06 2022] ? call_rcu+0x3c0/0x3c0\r\n[Thu Feb 10 12:59:06 2022] ? __this_cpu_preempt_check+0x13/0x20\r\n[Thu Feb 10 12:59:06 2022] ? lock_is_held_type+0xea/0x140\r\n[Thu Feb 10 12:59:06 2022] rcu_core_si+0xe/0x10\r\n[Thu Feb 10 12:59:06 2022] __do_softirq+0x1d4/0x67b\r\n[Thu Feb 10 12:59:06 2022] __irq_exit_rcu+0x100/0x150\r\n[Thu Feb 10 12:59:06 2022] irq_exit_rcu+0xe/0x30\r\n[Thu Feb 10 12:59:06 2022] sysvec_hyperv_stimer0+0x9d/0xc0\r\n...\r\n[Thu Feb 10 12:59:07 2022] Freed by task 58179:\r\n[Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50\r\n[Thu Feb 10 12:59:07 2022] kasan_set_track+0x25/0x30\r\n[Thu Feb 10 12:59:07 2022] kasan_set_free_info+0x24/0x40\r\n[Thu Feb 10 12:59:07 2022] ____kasan_slab_free+0x137/0x170\r\n[Thu Feb 10 12:59:07 2022] __kasan_slab_free+0x12/0x20\r\n[Thu Feb 10 12:59:07 2022] slab_free_freelist_hook+0xb3/0x1d0\r\n[Thu Feb 10 12:59:07 2022] kfree+0xcd/0x520\r\n[Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0x149/0xbe0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140\r\n[Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0\r\n[Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210\r\n[Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0\r\n[Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae\r\n\r\n[Thu Feb 10 12:59:07 2022] Last potentially related work creation:\r\n[Thu Feb 10 12:59:07 2022] kasan_save_stack+0x26/0x50\r\n[Thu Feb 10 12:59:07 2022] __kasan_record_aux_stack+0xb6/0xc0\r\n[Thu Feb 10 12:59:07 2022] kasan_record_aux_stack_noalloc+0xb/0x10\r\n[Thu Feb 10 12:59:07 2022] call_rcu+0x76/0x3c0\r\n[Thu Feb 10 12:59:07 2022] cifs_umount+0xce/0xe0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] cifs_kill_sb+0xc8/0xe0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] deactivate_locked_super+0x5d/0xd0\r\n[Thu Feb 10 12:59:07 2022] cifs_smb3_do_mount+0xab9/0xbe0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] smb3_get_tree+0x1a0/0x2e0 [cifs]\r\n[Thu Feb 10 12:59:07 2022] vfs_get_tree+0x52/0x140\r\n[Thu Feb 10 12:59:07 2022] path_mount+0x635/0x10c0\r\n[Thu Feb 10 12:59:07 2022] __x64_sys_mount+0x1bf/0x210\r\n[Thu Feb 10 12:59:07 2022] do_syscall_64+0x5c/0xc0\r\n[Thu Feb 10 12:59:07 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48919"
},
{
"cve": "CVE-2022-48926",
"cwe": {
"id": "CWE-414",
"name": "Missing Lock Check"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: rndis: add spinlock for rndis response list\r\n\r\nThere\u0027s no lock for rndis response list. It could cause list corruption\r\nif there\u0027re two different list_add at the same time like below.\r\nIt\u0027s better to add in rndis_add_response / rndis_free_response\r\n/ rndis_get_next_response to prevent any race condition on response list.\r\n\r\n[ 361.894299] [1: irq/191-dwc3:16979] list_add corruption.\r\nnext-\u003eprev should be prev (ffffff80651764d0),\r\nbut was ffffff883dc36f80. (next=ffffff80651764d0).\r\n\r\n[ 361.904380] [1: irq/191-dwc3:16979] Call trace:\r\n[ 361.904391] [1: irq/191-dwc3:16979] __list_add_valid+0x74/0x90\r\n[ 361.904401] [1: irq/191-dwc3:16979] rndis_msg_parser+0x168/0x8c0\r\n[ 361.904409] [1: irq/191-dwc3:16979] rndis_command_complete+0x24/0x84\r\n[ 361.904417] [1: irq/191-dwc3:16979] usb_gadget_giveback_request+0x20/0xe4\r\n[ 361.904426] [1: irq/191-dwc3:16979] dwc3_gadget_giveback+0x44/0x60\r\n[ 361.904434] [1: irq/191-dwc3:16979] dwc3_ep0_complete_data+0x1e8/0x3a0\r\n[ 361.904442] [1: irq/191-dwc3:16979] dwc3_ep0_interrupt+0x29c/0x3dc\r\n[ 361.904450] [1: irq/191-dwc3:16979] dwc3_process_event_entry+0x78/0x6cc\r\n[ 361.904457] [1: irq/191-dwc3:16979] dwc3_process_event_buf+0xa0/0x1ec\r\n[ 361.904465] [1: irq/191-dwc3:16979] dwc3_thread_interrupt+0x34/0x5c",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48926"
},
{
"cve": "CVE-2022-48948",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: uvc: Prevent buffer overflow in setup handler\r\n\r\nSetup function uvc_function_setup permits control transfer\r\nrequests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE),\r\ndata stage handler for OUT transfer uses memcpy to copy req-\u003eactual\r\nbytes to uvc_event-\u003edata.data array of size 60. This may result\r\nin an overflow of 4 bytes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48948"
},
{
"cve": "CVE-2022-48951",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()\r\n\r\nThe bounds checks in snd_soc_put_volsw_sx() are only being applied to the\r\nfirst channel, meaning it is possible to write out of bounds values to the\r\nsecond channel in stereo controls. Add appropriate checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48951"
},
{
"cve": "CVE-2022-48960",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: hisilicon: Fix potential use-after-free in hix5hd2_rx()\r\n\r\nThe skb is delivered to napi_gro_receive() which may free it, after\r\ncalling this, dereferencing skb may trigger use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48960"
},
{
"cve": "CVE-2022-48962",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: hisilicon: Fix potential use-after-free in hisi_femac_rx()\r\n\r\nThe skb is delivered to napi_gro_receive() which may free it, after\r\ncalling this, dereferencing skb may trigger use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48962"
},
{
"cve": "CVE-2022-48966",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: mvneta: Prevent out of bounds read in mvneta_config_rss()\r\n\r\nThe pp-\u003eindir[0] value comes from the user. It is passed to:\r\n\r\n\tif (cpu_online(pp-\u003erxq_def))\r\n\r\ninside the mvneta_percpu_elect() function. It needs bounds checkeding\r\nto ensure that it is not beyond the end of the cpu bitmap.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48966"
},
{
"cve": "CVE-2022-48967",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nNFC: nci: Bounds check struct nfc_target arrays\r\n\r\nWhile running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported:\r\n\r\n memcpy: detected field-spanning write (size 129) of single field \"target-\u003esensf_res\" at net/nfc/nci/ntf.c:260 (size 18)\r\n\r\nThis appears to be a legitimate lack of bounds checking in\r\nnci_add_new_protocol(). Add the missing checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-48967"
},
{
"cve": "CVE-2022-49058",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: potential buffer overflow in handling symlinks\n\nSmatch printed a warning:\n\tarch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error:\n\t__memcpy() \u0027dctx-\u003ebuf\u0027 too small (16 vs u32max)\n\nIt\u0027s caused because Smatch marks \u0027link_len\u0027 as untrusted since it comes\nfrom sscanf(). Add a check to ensure that \u0027link_len\u0027 is not larger than\nthe size of the \u0027link_str\u0027 buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2022-49058"
},
{
"cve": "CVE-2023-4641",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-4641"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28322",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "An information disclosure vulnerability exists in curl \u003cv8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-29383",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29491",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-29491"
},
{
"cve": "CVE-2023-41358",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-41358"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "summary",
"text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl\u0027s function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46753",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-46753"
},
{
"cve": "CVE-2023-47234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2023-47234"
},
{
"cve": "CVE-2024-0397",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A defect was discovered in the Python \u201cssl\u201d module where there is a memory\nrace condition with the ssl.SSLContext methods \u201ccert_store_stats()\u201d and\n\u201cget_ca_certs()\u201d. The race condition can be triggered if the methods are\ncalled at the same time as certificates are loaded into the SSLContext,\nsuch as during the TLS handshake with a certificate directory configured.\nThis issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "CPython 3.9 and earlier doesn\u0027t disallow configuring an empty list (\"[]\") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-5642"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "summary",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u2019t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-11168",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "he urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren\u0027t IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-11168"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "summary",
"text": "A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-12243",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-12243"
},
{
"cve": "CVE-2024-28085",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "summary",
"text": "wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users\u0027 terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-32487",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52533",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing \u0027\\\\0\u0027 character.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2024-52533"
},
{
"cve": "CVE-2025-0938",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn\u0027t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V2.17.0 or later version",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109997648/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11"
]
}
],
"title": "CVE-2025-0938"
}
]
}
SSA-613116
Vulnerability from csaf_siemens - Published: 2025-08-12 00:00 - Updated: 2026-02-12 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SINEC OS before V3.1 contains third-party components with multiple vulnerabilities.\n\nSiemens has released new versions for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-613116.html"
},
{
"category": "self",
"summary": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-613116.json"
}
],
"title": "SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1",
"tracking": {
"current_release_date": "2026-02-12T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-613116",
"initial_release_date": "2025-08-12T00:00:00Z",
"revision_history": [
{
"date": "2025-08-12T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2026-02-12T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Corrected list of Affected Products and moved entries to Known Not Affected Products"
}
],
"status": "interim",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "1",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
},
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.1",
"product": {
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)",
"product_id": "2",
"product_identification_helper": {
"model_numbers": [
"6GK6242-6PA00"
]
}
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2428P (6GK6242-6PA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family",
"product_id": "4"
}
},
{
"category": "product_version_range",
"name": "vers:intdot/\u003c3.1",
"product": {
"name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-48655",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scmi: Harden accesses to the reset domains\n\nAccessing reset domains descriptors by the index upon the SCMI drivers\nrequests through the SCMI reset operations interface can potentially\nlead to out-of-bound violations if the SCMI driver misbehave.\n\nAdd an internal consistency check before any such domains descriptors\naccesses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2022-48655"
},
{
"cve": "CVE-2022-48772",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: lgdt3306a: Add a check against null-pointer-def\n\nThe driver should check whether the client provides the platform_data.\n\nThe following log reveals it:\n\n[ 29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40\n[ 29.610730] Read of size 40 at addr 0000000000000000 by task bash/414\n[ 29.612820] Call Trace:\n[ 29.613030] \u003cTASK\u003e\n[ 29.613201] dump_stack_lvl+0x56/0x6f\n[ 29.613496] ? kmemdup+0x30/0x40\n[ 29.613754] print_report.cold+0x494/0x6b7\n[ 29.614082] ? kmemdup+0x30/0x40\n[ 29.614340] kasan_report+0x8a/0x190\n[ 29.614628] ? kmemdup+0x30/0x40\n[ 29.614888] kasan_check_range+0x14d/0x1d0\n[ 29.615213] memcpy+0x20/0x60\n[ 29.615454] kmemdup+0x30/0x40\n[ 29.615700] lgdt3306a_probe+0x52/0x310\n[ 29.616339] i2c_device_probe+0x951/0xa90",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2022-48772"
},
{
"cve": "CVE-2022-48935",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: unregister flowtable hooks on netns exit",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2022-48935"
},
{
"cve": "CVE-2023-3567",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-3567"
},
{
"cve": "CVE-2023-5178",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-5178"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5717",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-5717"
},
{
"cve": "CVE-2023-6040",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6040"
},
{
"cve": "CVE-2023-6121",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6121"
},
{
"cve": "CVE-2023-6606",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-35827",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-35827"
},
{
"cve": "CVE-2023-39198",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-39198"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-46343",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 6.5.9, there is a NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-46343"
},
{
"cve": "CVE-2023-51779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-51779"
},
{
"cve": "CVE-2023-51780",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-51780"
},
{
"cve": "CVE-2023-51781",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-51781"
},
{
"cve": "CVE-2023-51782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-51782"
},
{
"cve": "CVE-2023-52340",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2023-52433",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_set_rbtree: skip sync GC for new elements in this transaction",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52433"
},
{
"cve": "CVE-2023-52435",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: prevent mss overflow in skb_segment()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52435"
},
{
"cve": "CVE-2023-52475",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nInput: powermate - fix use-after-free in powermate_config_complete",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52475"
},
{
"cve": "CVE-2023-52477",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: hub: Guard against accesses to uninitialized BOS descriptors",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52477"
},
{
"cve": "CVE-2023-52478",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nHID: logitech-hidpp: Fix kernel crash on receiver USB disconnect",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52478"
},
{
"cve": "CVE-2023-52486",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm: Don\u0027t unref the same fb many times by mistake due to deadlock handling",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52486"
},
{
"cve": "CVE-2023-52502",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52502"
},
{
"cve": "CVE-2023-52504",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/alternatives: Disable KASAN in apply_alternatives()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52504"
},
{
"cve": "CVE-2023-52507",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: assert requested protocol is valid",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52507"
},
{
"cve": "CVE-2023-52509",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nravb: Fix use-after-free issue in ravb_tx_timeout_work()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52509"
},
{
"cve": "CVE-2023-52510",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nieee802154: ca8210: Fix a potential UAF in ca8210_probe",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52510"
},
{
"cve": "CVE-2023-52581",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: fix memleak when more than 255 elements expired",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52581"
},
{
"cve": "CVE-2023-52583",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nceph: fix deadlock or deadcode of misusing dget()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52583"
},
{
"cve": "CVE-2023-52587",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/ipoib: Fix mcast list locking",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52587"
},
{
"cve": "CVE-2023-52594",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52594"
},
{
"cve": "CVE-2023-52595",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: rt2x00: restart beacon queue when hardware reset",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52595"
},
{
"cve": "CVE-2023-52597",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: s390: fix setting of fpc register",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52597"
},
{
"cve": "CVE-2023-52598",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/ptrace: handle setting of fpc register correctly",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52598"
},
{
"cve": "CVE-2023-52599",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in diNewExt",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52599"
},
{
"cve": "CVE-2023-52600",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix uaf in jfs_evict_inode",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52600"
},
{
"cve": "CVE-2023-52601",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in dbAdjTree",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52601"
},
{
"cve": "CVE-2023-52602",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix slab-out-of-bounds Read in dtSearch",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52602"
},
{
"cve": "CVE-2023-52603",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nUBSAN: array-index-out-of-bounds in dtSplitRoot",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52603"
},
{
"cve": "CVE-2023-52604",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nFS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52604"
},
{
"cve": "CVE-2023-52606",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npowerpc/lib: Validate size for vector operations",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52606"
},
{
"cve": "CVE-2023-52607",
"cwe": {
"id": "CWE-395",
"name": "Use of NullPointerException Catch to Detect NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npowerpc/mm: Fix null-pointer dereference in pgtable_cache_add",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52607"
},
{
"cve": "CVE-2023-52615",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhwrng: core - Fix page fault dead lock on mmap-ed hwrng",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52615"
},
{
"cve": "CVE-2023-52617",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nPCI: switchtec: Fix stdev_release() crash after surprise hot remove",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52617"
},
{
"cve": "CVE-2023-52619",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npstore/ram: Fix crash when setting number of cpus to an odd number",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52619"
},
{
"cve": "CVE-2023-52622",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid online resizing failures due to oversized flex bg.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52622"
},
{
"cve": "CVE-2023-52623",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nSUNRPC: Fix a suspicious RCU usage warning",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52623"
},
{
"cve": "CVE-2023-52637",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncan: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52637"
},
{
"cve": "CVE-2023-52654",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nio_uring/af_unix: disable sending io_uring over sockets",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52654"
},
{
"cve": "CVE-2023-52655",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: aqc111: check packet for fixup for true limit",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52670",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrpmsg: virtio: Free driver_override when rpmsg_remove()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52670"
},
{
"cve": "CVE-2023-52753",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Avoid NULL dereference of timing generator",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52753"
},
{
"cve": "CVE-2023-52764",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52764"
},
{
"cve": "CVE-2023-52774",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/dasd: protect device queue against concurrent access",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52784",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbonding: stop the device in bond_setup_by_slave()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52784"
},
{
"cve": "CVE-2023-52789",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntty: vcc: Add check for kstrdup() in vcc_probe()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52789"
},
{
"cve": "CVE-2023-52791",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni2c: core: Run atomic i2c xfer when !preemptible",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52791"
},
{
"cve": "CVE-2023-52796",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipvlan: add ipvlan_route_v6_outbound() helper",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52799",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in dbFindLeaf",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52799"
},
{
"cve": "CVE-2023-52804",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/jfs: Add validity check for db_maxag and db_agpref",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52804"
},
{
"cve": "CVE-2023-52805",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: fix array-index-out-of-bounds in diAlloc",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52805"
},
{
"cve": "CVE-2023-52806",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nALSA: hda: Fix possible null-ptr-deref when assigning a stream",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52806"
},
{
"cve": "CVE-2023-52809",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52809"
},
{
"cve": "CVE-2023-52810",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/jfs: Add check for negative db_l2nbperpage",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52810"
},
{
"cve": "CVE-2023-52813",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncrypto: pcrypt - Fix hungtask for PADATA_RESET",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52813"
},
{
"cve": "CVE-2023-52817",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52817"
},
{
"cve": "CVE-2023-52818",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd: Fix UBSAN array-index-out-of-bounds for SMU7",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52818"
},
{
"cve": "CVE-2023-52819",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52819"
},
{
"cve": "CVE-2023-52832",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: don\u0027t return unset power in ieee80211_get_tx_power()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52832"
},
{
"cve": "CVE-2023-52835",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nperf/core: Bail out early if the request AUX area is out of bound",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52835"
},
{
"cve": "CVE-2023-52836",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nlocking/ww_mutex/test: Fix potential workqueue corruption",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52836"
},
{
"cve": "CVE-2023-52838",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: imsttfb: fix a resource leak in probe",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52838"
},
{
"cve": "CVE-2023-52840",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nInput: synaptics-rmi4 - fix use after free in rmi_unregister_function()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52840"
},
{
"cve": "CVE-2023-52843",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: verify mac len before reading mac header",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52843"
},
{
"cve": "CVE-2023-52845",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntipc: Change nla_policy for bearer-related names to NLA_NUL_STRING",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52845"
},
{
"cve": "CVE-2023-52847",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: bttv: fix use after free error due to btv-\u003etimeout timer",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52847"
},
{
"cve": "CVE-2023-52853",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhid: cp2112: Fix duplicate workqueue initialization",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52853"
},
{
"cve": "CVE-2023-52855",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: dwc2: fix possible NULL pointer dereference caused by driver concurrency",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52855"
},
{
"cve": "CVE-2023-52858",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52858"
},
{
"cve": "CVE-2023-52864",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nplatform/x86: wmi: Fix opening of char device",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/radeon: possible buffer overflow",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52868",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nthermal: core: prevent potential string overflow",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52868"
},
{
"cve": "CVE-2023-52871",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsoc: qcom: llcc: Handle a second device without data corruption",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52871"
},
{
"cve": "CVE-2023-52873",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52873"
},
{
"cve": "CVE-2023-52875",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52876",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52876"
},
{
"cve": "CVE-2023-52879",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntracing: Have trace_event_file have ref counters",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52879"
},
{
"cve": "CVE-2023-52881",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: do not accept ACK of bytes we never sent",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2023-52882",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change\n\nWhile PLL CPUX clock rate change when CPU is running from it works in\nvast majority of cases, now and then it causes instability. This leads\nto system crashes and other undefined behaviour. After a lot of testing\n(30+ hours) while also doing a lot of frequency switches, we can\u0027t\nobserve any instability issues anymore when doing reparenting to stable\nclock like 24 MHz oscillator.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2023-52882"
},
{
"cve": "CVE-2023-52887",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: can: j1939: vulnerability related to error handling for closely received RTS messages in xtp_rx_rts_session_new, which is addressed by replacing less informative backtraces with a new method that provides clearer error messages and allows for early termination of problematic sessions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2023-52887"
},
{
"cve": "CVE-2023-52918",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pci: cx23885: check cx23885_vdev_init() return\n\ncx23885_vdev_init() can return a NULL pointer, but that pointer\nis used in the next line without a check.\n\nAdd a NULL pointer check and go to the error unwind if it is NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2023-52918"
},
{
"cve": "CVE-2023-52919",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: fix possible NULL pointer dereference in send_acknowledge()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2023-52919"
},
{
"cve": "CVE-2024-0193",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-0193"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0646",
"cwe": {
"id": "CWE-1314",
"name": "Missing Write Protection for Parametric Data Values"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-0646"
},
{
"cve": "CVE-2024-0841",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-0841"
},
{
"cve": "CVE-2024-1086",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nThe nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-1086"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions. An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "summary",
"text": "Checking excessively long DSA keys or parameters may be very slow. Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. These functions are not called by OpenSSL itself on untrusted DSA keys so only applications that directly call these functions may be vulnerable. Also vulnerable are the OpenSSL pkey and pkeyparam command line applications when using the `-check` option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don\u0027t perform a name check against a reference identifier (expected identity), but rather extract the presented identity after checking the certificate chain. So TLS servers are generally not affected and the severity of the issue is Moderate. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "summary",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-25741",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "printer_write in drivers/usb/gadget/function/f_printer.c in the Linux kernel through 6.7.4 does not properly call usb_ep_queue, which might allow attackers to cause a denial of service or have unspecified other impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-25741"
},
{
"cve": "CVE-2024-26581",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_set_rbtree: skip end interval element from gc",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26581"
},
{
"cve": "CVE-2024-26593",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ni2c: i801: Fix block process call transactions",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26598",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26598"
},
{
"cve": "CVE-2024-26600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nphy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26600"
},
{
"cve": "CVE-2024-26602",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsched/membarrier: reduce the ability to hammer on sys_membarrier",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26606",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbinder: signal epoll threads of self-work",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26606"
},
{
"cve": "CVE-2024-26615",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/smc: fix illegal rmb_desc access in SMC-D connection dump",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26615"
},
{
"cve": "CVE-2024-26625",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: call sock_orphan() at release time",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26635",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: Drop support for ETH_P_TR_802_2.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26635"
},
{
"cve": "CVE-2024-26636",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nllc: make llc_ui_sendmsg() more robust against bonding changes",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26636"
},
{
"cve": "CVE-2024-26645",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26645"
},
{
"cve": "CVE-2024-26663",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntipc: Check the bearer type before calling tipc_udp_nl_bearer_add()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26663"
},
{
"cve": "CVE-2024-26664",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhwmon: (coretemp) Fix out-of-bounds memory access",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26664"
},
{
"cve": "CVE-2024-26671",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix IO hang from sbitmap wakeup race.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26671"
},
{
"cve": "CVE-2024-26673",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26673"
},
{
"cve": "CVE-2024-26675",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp_async: limit MRU to 64K",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26675"
},
{
"cve": "CVE-2024-26679",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninet: read sk-\u003esk_family once in inet_recv_error()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26679"
},
{
"cve": "CVE-2024-26684",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: stmmac: xgmac: fix handling of DPP safety error for DMA channels",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26684"
},
{
"cve": "CVE-2024-26685",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix potential bug in end_buffer_async_write",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26685"
},
{
"cve": "CVE-2024-26688",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26688"
},
{
"cve": "CVE-2024-26696",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix hang in nilfs_lookup_dirty_data_buffers()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26696"
},
{
"cve": "CVE-2024-26697",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnilfs2: fix data corruption in dsync block recovery for small block sizes",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26697"
},
{
"cve": "CVE-2024-26702",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\niio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26702"
},
{
"cve": "CVE-2024-26704",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: fix double-free of blocks due to wrong extents moved_len",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26704"
},
{
"cve": "CVE-2024-26720",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26720"
},
{
"cve": "CVE-2024-26722",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26722"
},
{
"cve": "CVE-2024-26735",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: sr: fix possible use-after-free and null-ptr-deref",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26735"
},
{
"cve": "CVE-2024-26736",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nafs: Increase buffer size in afs_update_volume_status()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26736"
},
{
"cve": "CVE-2024-26748",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: cdns3: fix memory double free when handle zero packet",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26748"
},
{
"cve": "CVE-2024-26749",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26749"
},
{
"cve": "CVE-2024-26751",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nARM: ep93xx: Add terminator to gpiod_lookup_table",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26751"
},
{
"cve": "CVE-2024-26752",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nl2tp: pass correct message length to ip6_append_data",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26754",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26754"
},
{
"cve": "CVE-2024-26763",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndm-crypt: don\u0027t modify the data when using authenticated encryption",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26763"
},
{
"cve": "CVE-2024-26764",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26764"
},
{
"cve": "CVE-2024-26766",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26766"
},
{
"cve": "CVE-2024-26772",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\r\n\r\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\r\nthe protection of the group lock to avoid allocating blocks from the group\r\nwith a corrupted block bitmap.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26772"
},
{
"cve": "CVE-2024-26773",
"cwe": {
"id": "CWE-413",
"name": "Improper Resource Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found().",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26773"
},
{
"cve": "CVE-2024-26777",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: sis: Error out if pixclock equals zero",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26777"
},
{
"cve": "CVE-2024-26778",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: savage: Error out if pixclock equals zero",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26778"
},
{
"cve": "CVE-2024-26779",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: mac80211: fix race condition on enabling fast-xmit",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26779"
},
{
"cve": "CVE-2024-26788",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: init irq after reg initialization",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26788"
},
{
"cve": "CVE-2024-26790",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26790"
},
{
"cve": "CVE-2024-26791",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: dev-replace: properly validate device names",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26793",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngtp: fix use-after-free and null-ptr-deref in gtp_newlink()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26793"
},
{
"cve": "CVE-2024-26801",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: Avoid potential use-after-free in hci_error_reset",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26801"
},
{
"cve": "CVE-2024-26804",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: ip_tunnel: prevent perpetual headroom growth",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26804"
},
{
"cve": "CVE-2024-26805",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in skb_datagram_iter.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26805"
},
{
"cve": "CVE-2024-26825",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnfc: nci: free rx_data_reassembly skb on NCI device cleanup",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26825"
},
{
"cve": "CVE-2024-26835",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: set dormant flag on hook register failure",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26835"
},
{
"cve": "CVE-2024-26839",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nIB/hfi1: Fix a memleak in init_credit_return",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26839"
},
{
"cve": "CVE-2024-26840",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncachefiles: fix memory leak in cachefiles_add_cache()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26840"
},
{
"cve": "CVE-2024-26845",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: target: core: Add TMF to tmr_list handling",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26845"
},
{
"cve": "CVE-2024-26900",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix kmemleak of rdev-\u003eserial\n\nIf kobject_add() is fail in bind_rdev_to_array(), \u0027rdev-\u003eserial\u0027 will be\nalloc not be freed, and kmemleak occurs.\n\nunreferenced object 0xffff88815a350000 (size 49152):\n comm \"mdadm\", pid 789, jiffies 4294716910\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc f773277a):\n [\u003c0000000058b0a453\u003e] kmemleak_alloc+0x61/0xe0\n [\u003c00000000366adf14\u003e] __kmalloc_large_node+0x15e/0x270\n [\u003c000000002e82961b\u003e] __kmalloc_node.cold+0x11/0x7f\n [\u003c00000000f206d60a\u003e] kvmalloc_node+0x74/0x150\n [\u003c0000000034bf3363\u003e] rdev_init_serial+0x67/0x170\n [\u003c0000000010e08fe9\u003e] mddev_create_serial_pool+0x62/0x220\n [\u003c00000000c3837bf0\u003e] bind_rdev_to_array+0x2af/0x630\n [\u003c0000000073c28560\u003e] md_add_new_disk+0x400/0x9f0\n [\u003c00000000770e30ff\u003e] md_ioctl+0x15bf/0x1c10\n [\u003c000000006cfab718\u003e] blkdev_ioctl+0x191/0x3f0\n [\u003c0000000085086a11\u003e] vfs_ioctl+0x22/0x60\n [\u003c0000000018b656fe\u003e] __x64_sys_ioctl+0xba/0xe0\n [\u003c00000000e54e675e\u003e] do_syscall_64+0x71/0x150\n [\u003c000000008b0ad622\u003e] entry_SYSCALL_64_after_hwframe+0x6c/0x74",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26910",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: ipset: fix performance regression in swap operation",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-26910"
},
{
"cve": "CVE-2024-26923",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-26924",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_set_pipapo: do not free live element\n\nPablo reports a crash with large batches of elements with a\nback-to-back add/remove pattern. Quoting Pablo:\n\n add_elem(\"00000000\") timeout 100 ms\n ...\n add_elem(\"0000000X\") timeout 100 ms\n del_elem(\"0000000X\") \u003c---------------- delete one that was just added\n ...\n add_elem(\"00005000\") timeout 100 ms\n\n 1) nft_pipapo_remove() removes element 0000000X\n Then, KASAN shows a splat.\n\nLooking at the remove function there is a chance that we will drop a\nrule that maps to a non-deactivated element.\n\nRemoval happens in two steps, first we do a lookup for key k and return the\nto-be-removed element and mark it as inactive in the next generation.\nThen, in a second step, the element gets removed from the set/map.\n\nThe _remove function does not work correctly if we have more than one\nelement that share the same key.\n\nThis can happen if we insert an element into a set when the set already\nholds an element with same key, but the element mapping to the existing\nkey has timed out or is not active in the next generation.\n\nIn such case its possible that removal will unmap the wrong element.\nIf this happens, we will leak the non-deactivated element, it becomes\nunreachable.\n\nThe element that got deactivated (and will be freed later) will\nremain reachable in the set data structure, this can result in\na crash when such an element is retrieved during lookup (stale\npointer).\n\nAdd a check that the fully matching key does in fact map to the element\nthat we have marked as inactive in the deactivation step.\nIf not, we need to continue searching.\n\nAdd a bug/warn trap at the end of the function as well, the remove\nfunction must not ever be called with an invisible/unreachable/non-existent\nelement.\n\nv2: avoid uneeded temporary variable (Stefano)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26924"
},
{
"cve": "CVE-2024-26926",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: check offset alignment in binder_get_object()\n\nCommit 6d98eb95b450 (\"binder: avoid potential data leakage when copying\ntxn\") introduced changes to how binder objects are copied. In doing so,\nit unintentionally removed an offset alignment check done through calls\nto binder_alloc_copy_from_buffer() -\u003e check_buffer().\n\nThese calls were replaced in binder_get_object() with copy_from_user(),\nso now an explicit offset alignment check is needed here. This avoids\nlater complications when unwinding the objects gets harder.\n\nIt is worth noting this check existed prior to commit 7a67a39320df\n(\"binder: add function to copy binder object from buffer\"), likely\nremoved due to redundancy at the time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26926"
},
{
"cve": "CVE-2024-26988",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninit/main.c: Fix potential static_command_line memory overflow",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26988"
},
{
"cve": "CVE-2024-26993",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs: sysfs: Fix reference leak in sysfs_break_active_protection()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26993"
},
{
"cve": "CVE-2024-26994",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspeakup: Avoid crash on very long word\n\nIn case a console is set up really large and contains a really long word\n(\u003e 256 characters), we have to stop before the length of the word buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26994"
},
{
"cve": "CVE-2024-26997",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: host: Fix dereference issue in DDMA completion flow.\n\nFixed variable dereference issue in DDMA completion flow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26997"
},
{
"cve": "CVE-2024-26999",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial/pmac_zilog: Remove flawed mitigation for rx irq flood\n\nThe mitigation was intended to stop the irq completely. That may be\nbetter than a hard lock-up but it turns out that you get a crash anyway\nif you\u0027re using pmac_zilog as a serial console:\n\nttyPZ0: pmz: rx irq flood !\nBUG: spinlock recursion on CPU#0, swapper/0\n\nThat\u0027s because the pr_err() call in pmz_receive_chars() results in\npmz_console_write() attempting to lock a spinlock already locked in\npmz_interrupt(). With CONFIG_DEBUG_SPINLOCK=y, this produces a fatal\nBUG splat. The spinlock in question is the one in struct uart_port.\n\nEven when it\u0027s not fatal, the serial port rx function ceases to work.\nAlso, the iteration limit doesn\u0027t play nicely with QEMU, as can be\nseen in the bug report linked below.\n\nA web search for other reports of the error message \"pmz: rx irq flood\"\ndidn\u0027t produce anything. So I don\u0027t think this code is needed any more.\nRemove it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-26999"
},
{
"cve": "CVE-2024-27000",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: mxs-auart: add spinlock around changing cts state\n\nThe uart_handle_cts_change() function in serial_core expects the caller\nto hold uport-\u003elock. For example, I have seen the below kernel splat,\nwhen the Bluetooth driver is loaded on an i.MX28 board.\n\n [ 85.119255] ------------[ cut here ]------------\n [ 85.124413] WARNING: CPU: 0 PID: 27 at /drivers/tty/serial/serial_core.c:3453 uart_handle_cts_change+0xb4/0xec\n [ 85.134694] Modules linked in: hci_uart bluetooth ecdh_generic ecc wlcore_sdio configfs\n [ 85.143314] CPU: 0 PID: 27 Comm: kworker/u3:0 Not tainted 6.6.3-00021-gd62a2f068f92 #1\n [ 85.151396] Hardware name: Freescale MXS (Device Tree)\n [ 85.156679] Workqueue: hci0 hci_power_on [bluetooth]\n (...)\n [ 85.191765] uart_handle_cts_change from mxs_auart_irq_handle+0x380/0x3f4\n [ 85.198787] mxs_auart_irq_handle from __handle_irq_event_percpu+0x88/0x210\n (...)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27000"
},
{
"cve": "CVE-2024-27001",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: vmk80xx: fix incomplete endpoint checking\n\nWhile vmk80xx does have endpoint checking implemented, some things\ncan fall through the cracks. Depending on the hardware model,\nURBs can have either bulk or interrupt type, and current version\nof vmk80xx_find_usb_endpoints() function does not take that fully\ninto account. While this warning does not seem to be too harmful,\nat the very least it will crash systems with \u0027panic_on_warn\u0027 set on\nthem.\n\nFix the issue found by Syzkaller [1] by somewhat simplifying the\nendpoint checking process with usb_find_common_endpoints() and\nensuring that only expected endpoint types are present.\n\nThis patch has not been tested on real hardware.\n\n[1] Syzkaller report:\nusb 1-1: BOGUS urb xfer, pipe 1 != type 3\nWARNING: CPU: 0 PID: 781 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x113/0x520 drivers/usb/core/message.c:59\n vmk80xx_reset_device drivers/comedi/drivers/vmk80xx.c:227 [inline]\n vmk80xx_auto_attach+0xa1c/0x1a40 drivers/comedi/drivers/vmk80xx.c:818\n comedi_auto_config+0x238/0x380 drivers/comedi/drivers.c:1067\n usb_probe_interface+0x5cd/0xb00 drivers/usb/core/driver.c:399\n...\n\nSimilar issue also found by Syzkaller:",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27001"
},
{
"cve": "CVE-2024-27004",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nclk: Get runtime PM before walking tree during disable_unused",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27004"
},
{
"cve": "CVE-2024-27013",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntun: limit printing rate when illegal packet received by tun dev\r\n\r\nvhost_worker will call tun call backs to receive packets. If too many\r\nillegal packets arrives, tun_do_read will keep dumping packet contents.\r\nWhen console is enabled, it will costs much more cpu time to dump\r\npacket and soft lockup will be detected.\r\n\r\nnet_ratelimit mechanism can be used to limit the dumping rate.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27013"
},
{
"cve": "CVE-2024-27019",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()\n\nnft_unregister_obj() can concurrent with __nft_obj_type_get(),\nand there is not any protection when iterate over nf_tables_objects\nlist in __nft_obj_type_get(). Therefore, there is potential data-race\nof nf_tables_objects list entry.\n\nUse list_for_each_entry_rcu() to iterate over nf_tables_objects\nlist in __nft_obj_type_get(), and use rcu_read_lock() in the caller\nnft_obj_type_get() to protect the entire type query process.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27019"
},
{
"cve": "CVE-2024-27020",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in nft_expr_type_get().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27395",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: Fix Use-After-Free in ovs_ct_exit\n\nSince kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof ovs_ct_limit_exit, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27395"
},
{
"cve": "CVE-2024-27396",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gtp: Fix Use-After-Free in gtp_dellink\n\nSince call_rcu, which is called in the hlist_for_each_entry_rcu traversal\nof gtp_dellink, is not part of the RCU read critical section, it\nis possible that the RCU grace period will pass during the traversal and\nthe key will be free.\n\nTo prevent this, it should be changed to hlist_for_each_entry_safe.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27405",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27405"
},
{
"cve": "CVE-2024-27410",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: nl80211: reject iftype change with mesh ID change",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27410"
},
{
"cve": "CVE-2024-27412",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\npower: supply: bq27xxx-i2c: Do not free non existing IRQ",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27412"
},
{
"cve": "CVE-2024-27413",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nefi/capsule-loader: fix incorrect allocation size",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27413"
},
{
"cve": "CVE-2024-27414",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27414"
},
{
"cve": "CVE-2024-27416",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nBluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27416"
},
{
"cve": "CVE-2024-27417",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: fix potential \"struct net\" leak in inet6_rtm_getaddr()",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-27417"
},
{
"cve": "CVE-2024-31076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngenirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline\n\nThe absence of IRQD_MOVE_PCNTXT prevents immediate effectiveness of\ninterrupt affinity reconfiguration via procfs. Instead, the change is\ndeferred until the next instance of the interrupt being triggered on the\noriginal CPU.\n\nWhen the interrupt next triggers on the original CPU, the new affinity is\nenforced within __irq_move_irq(). A vector is allocated from the new CPU,\nbut the old vector on the original CPU remains and is not immediately\nreclaimed. Instead, apicd-\u003emove_in_progress is flagged, and the reclaiming\nprocess is delayed until the next trigger of the interrupt on the new CPU.\n\nUpon the subsequent triggering of the interrupt on the new CPU,\nirq_complete_move() adds a task to the old CPU\u0027s vector_cleanup list if it\nremains online. Subsequently, the timer on the old CPU iterates over its\nvector_cleanup list, reclaiming old vectors.\n\nHowever, a rare scenario arises if the old CPU is outgoing before the\ninterrupt triggers again on the new CPU.\n\nIn that case irq_force_complete_move() is not invoked on the outgoing CPU\nto reclaim the old apicd-\u003eprev_vector because the interrupt isn\u0027t currently\naffine to the outgoing CPU, and irq_needs_fixup() returns false. Even\nthough __vector_schedule_cleanup() is later called on the new CPU, it\ndoesn\u0027t reclaim apicd-\u003eprev_vector; instead, it simply resets both\napicd-\u003emove_in_progress and apicd-\u003eprev_vector to 0.\n\nAs a result, the vector remains unreclaimed in vector_matrix, leading to a\nCPU vector leak.\n\nTo address this issue, move the invocation of irq_force_complete_move()\nbefore the irq_needs_fixup() call to reclaim apicd-\u003eprev_vector, if the\ninterrupt is currently or used to be affine to the outgoing CPU.\n\nAdditionally, reclaim the vector in __vector_schedule_cleanup() as well,\nfollowing a warning message, although theoretically it should never see\napicd-\u003emove_in_progress with apicd-\u003eprev_cpu pointing to an offline CPU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-31076"
},
{
"cve": "CVE-2024-33621",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb-\u003esk in ipvlan_process_v4 / 6_outbound.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-33621"
},
{
"cve": "CVE-2024-34397",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-34397"
},
{
"cve": "CVE-2024-35247",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: region: add owner module and take its refcount\n\nThe current implementation of the fpga region assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module\u0027s refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the region\nduring programming if the parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_region\nstruct and use it to take the module\u0027s refcount. Modify the functions for\nregistering a region to take an additional owner module parameter and\nrename them to avoid conflicts. Use the old function names for helper\nmacros that automatically set the module that registers the region as the\nowner. This ensures compatibility with existing low-level control modules\nand reduces the chances of registering a region without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga region.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35247"
},
{
"cve": "CVE-2024-35833",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-35833"
},
{
"cve": "CVE-2024-35835",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/mlx5e: fix a double-free in arfs_create_groups",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-35835"
},
{
"cve": "CVE-2024-35847",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Prevent double free on error\n\nThe error handling path in its_vpe_irq_domain_alloc() causes a double free\nwhen its_vpe_init() fails after successfully allocating at least one\ninterrupt. This happens because its_vpe_irq_domain_free() frees the\ninterrupts along with the area bitmap and the vprop_page and\nits_vpe_irq_domain_alloc() subsequently frees the area bitmap and the\nvprop_page again.\n\nFix this by unconditionally invoking its_vpe_irq_domain_free() which\nhandles all cases correctly and by removing the bitmap/vprop_page freeing\nfrom its_vpe_irq_domain_alloc().\n\n[ tglx: Massaged change log ]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35847"
},
{
"cve": "CVE-2024-35848",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\neeprom: at24: fix memory corruption race condition\n\nIf the eeprom is not accessible, an nvmem device will be registered, the\nread will fail, and the device will be torn down. If another driver\naccesses the nvmem device after the teardown, it will reference\ninvalid memory.\n\nMove the failure point before registering the nvmem device.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35848"
},
{
"cve": "CVE-2024-35852",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work\n\nThe rehash delayed work is rescheduled with a delay if the number of\ncredits at end of the work is not negative as supposedly it means that\nthe migration ended. Otherwise, it is rescheduled immediately.\n\nAfter \"mlxsw: spectrum_acl_tcam: Fix possible use-after-free during\nrehash\" the above is no longer accurate as a non-negative number of\ncredits is no longer indicative of the migration being done. It can also\nhappen if the work encountered an error in which case the migration will\nresume the next time the work is scheduled.\n\nThe significance of the above is that it is possible for the work to be\npending and associated with hints that were allocated when the migration\nstarted. This leads to the hints being leaked [1] when the work is\ncanceled while pending as part of ACL region dismantle.\n\nFix by freeing the hints if hints are associated with a work that was\ncanceled while pending.\n\nBlame the original commit since the reliance on not having a pending\nwork associated with hints is fragile.\n\n[1]\nunreferenced object 0xffff88810e7c3000 (size 256):\n comm \"kworker/0:16\", pid 176, jiffies 4295460353\n hex dump (first 32 bytes):\n 00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80 .0......a.......\n 00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00 ..a.@...........\n backtrace (crc 2544ddb9):\n [\u003c00000000cf8cfab3\u003e] kmalloc_trace+0x23f/0x2a0\n [\u003c000000004d9a1ad9\u003e] objagg_hints_get+0x42/0x390\n [\u003c000000000b143cf3\u003e] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400\n [\u003c0000000059bdb60a\u003e] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160\n [\u003c00000000e81fd734\u003e] process_one_work+0x59c/0xf20\n [\u003c00000000ceee9e81\u003e] worker_thread+0x799/0x12c0\n [\u003c00000000bda6fe39\u003e] kthread+0x246/0x300\n [\u003c0000000070056d23\u003e] ret_from_fork+0x34/0x70\n [\u003c00000000dea2b93e\u003e] ret_from_fork_asm+0x1a/0x30",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35852"
},
{
"cve": "CVE-2024-35853",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix memory leak during rehash\n\nThe rehash delayed work migrates filters from one region to another.\nThis is done by iterating over all chunks (all the filters with the same\npriority) in the region and in each chunk iterating over all the\nfilters.\n\nIf the migration fails, the code tries to migrate the filters back to\nthe old region. However, the rollback itself can also fail in which case\nanother migration will be erroneously performed. Besides the fact that\nthis ping pong is not a very good idea, it also creates a problem.\n\nEach virtual chunk references two chunks: The currently used one\n(\u0027vchunk-\u003echunk\u0027) and a backup (\u0027vchunk-\u003echunk2\u0027). During migration the\nfirst holds the chunk we want to migrate filters to and the second holds\nthe chunk we are migrating filters from.\n\nThe code currently assumes - but does not verify - that the backup chunk\ndoes not exist (NULL) if the currently used chunk does not reference the\ntarget region. This assumption breaks when we are trying to rollback a\nrollback, resulting in the backup chunk being overwritten and leaked\n[1].\n\nFix by not rolling back a failed rollback and add a warning to avoid\nfuture cases.\n\n[1]\nWARNING: CPU: 5 PID: 1063 at lib/parman.c:291 parman_destroy+0x17/0x20\nModules linked in:\nCPU: 5 PID: 1063 Comm: kworker/5:11 Tainted: G W 6.9.0-rc2-custom-00784-gc6a05c468a0b #14\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:parman_destroy+0x17/0x20\n[...]\nCall Trace:\n \u003cTASK\u003e\n mlxsw_sp_acl_atcam_region_fini+0x19/0x60\n mlxsw_sp_acl_tcam_region_destroy+0x49/0xf0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x1f1/0x470\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35853"
},
{
"cve": "CVE-2024-35854",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash\n\nThe rehash delayed work migrates filters from one region to another\naccording to the number of available credits.\n\nThe migrated from region is destroyed at the end of the work if the\nnumber of credits is non-negative as the assumption is that this is\nindicative of migration being complete. This assumption is incorrect as\na non-negative number of credits can also be the result of a failed\nmigration.\n\nThe destruction of a region that still has filters referencing it can\nresult in a use-after-free [1].\n\nFix by not destroying the region if migration failed.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\nRead of size 8 at addr ffff8881735319e8 by task kworker/0:31/3858\n\nCPU: 0 PID: 3858 Comm: kworker/0:31 Tainted: G W 6.9.0-rc2-custom-00782-gf2275c2157d8 #5\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230\n mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70\n mlxsw_sp_acl_atcam_entry_del+0x81/0x210\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3cd/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\nAllocated by task 174:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_region_create+0xdf/0x9c0\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 7:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_region_destroy+0x272/0x310\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35854"
},
{
"cve": "CVE-2024-35855",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update\n\nThe rule activity update delayed work periodically traverses the list of\nconfigured rules and queries their activity from the device.\n\nAs part of this task it accesses the entry pointed by \u0027ventry-\u003eentry\u0027,\nbut this entry can be changed concurrently by the rehash delayed work,\nleading to a use-after-free [1].\n\nFix by closing the race and perform the activity query under the\n\u0027vregion-\u003elock\u0027 mutex.\n\n[1]\nBUG: KASAN: slab-use-after-free in mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\nRead of size 8 at addr ffff8881054ed808 by task kworker/0:18/181\n\nCPU: 0 PID: 181 Comm: kworker/0:18 Not tainted 6.9.0-rc2-custom-00781-gd5ab772d32f7 #2\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_rule_activity_update_work\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc6/0x120\n print_report+0xce/0x670\n kasan_report+0xd7/0x110\n mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140\n mlxsw_sp_acl_rule_activity_update_work+0x219/0x400\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\nAllocated by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x8f/0xa0\n __kmalloc+0x19c/0x360\n mlxsw_sp_acl_tcam_entry_create+0x7b/0x1f0\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x30d/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 1039:\n kasan_save_stack+0x33/0x60\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n poison_slab_object+0x102/0x170\n __kasan_slab_free+0x14/0x30\n kfree+0xc1/0x290\n mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3d7/0xb50\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300\n process_one_work+0x8eb/0x19b0\n worker_thread+0x6c9/0xf70\n kthread+0x2c9/0x3b0\n ret_from_fork+0x4d/0x80\n ret_from_fork_asm+0x1a/0x30",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35855"
},
{
"cve": "CVE-2024-35947",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in \u003econtrol parser\n\nFix a BUG_ON from 2009. Even if it looks \"unreachable\" (I didn\u0027t\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35947"
},
{
"cve": "CVE-2024-35955",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "kprobes: Fix possible use-after-free issue on kprobe registration",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net: ena: Fix incorrect descriptor free behavior",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35958"
},
{
"cve": "CVE-2024-35960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "net/mlx5: Properly link new fs rules into the tree",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35960"
},
{
"cve": "CVE-2024-35962",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "summary",
"text": "netfilter: complete validation of user input",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-35969",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35973",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "geneve: fix header validation in geneve_xmit_skb",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35973"
},
{
"cve": "CVE-2024-35976",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "xsk: validate user input for XDP_UMEM|COMPLETION_FILL_RING",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35976"
},
{
"cve": "CVE-2024-35983",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35983"
},
{
"cve": "CVE-2024-35984",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "i2c: smbus: fix NULL function pointer dereference",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35984"
},
{
"cve": "CVE-2024-35990",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "dma: xilinx_dpdma: Fix locking",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35990"
},
{
"cve": "CVE-2024-35996",
"cwe": {
"id": "CWE-655",
"name": "Insufficient Psychological Acceptability"
},
"notes": [
{
"category": "summary",
"text": "cpu: Re-enable CPU mitigations by default for !X86 architectures",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-35996"
},
{
"cve": "CVE-2024-36005",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: nf_tables: honor table dormant flag from netdev release event path",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36005"
},
{
"cve": "CVE-2024-36006",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmlxsw: spectrum_acl_tcam: Fix incorrect list API usage",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36006"
},
{
"cve": "CVE-2024-36007",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmlxsw: spectrum_acl_tcam: Fix warning during rehash\r\n\r\nAs previously explained, the rehash delayed work migrates filters from\r\none region to another. This is done by iterating over all chunks (all\r\nthe filters with the same priority) in the region and in each chunk\r\niterating over all the filters.\r\n\r\nWhen the work runs out of credits it stores the current chunk and entry\r\nas markers in the per-work context so that it would know where to resume\r\nthe migration from the next time the work is scheduled.\r\n\r\nUpon error, the chunk marker is reset to NULL, but without resetting the\r\nentry markers despite being relative to it. This can result in migration\r\nbeing resumed from an entry that does not belong to the chunk being\r\nmigrated. In turn, this will eventually lead to a chunk being iterated\r\nover as if it is an entry. Because of how the two structures happen to\r\nbe defined, this does not lead to KASAN splats, but to warnings such as.\r\n\r\nFix by creating a helper that resets all the markers and call it from\r\nall the places the currently only reset the chunk marker. For good\r\nmeasures also call it when starting a completely new rehash. Add a\r\nwarning to avoid future cases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36007"
},
{
"cve": "CVE-2024-36008",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv4: check for NULL idev in ip_route_use_hint()\r\n\r\nsyzbot was able to trigger a NULL deref in fib_validate_source()\r\nin an old tree.\r\n\r\nIt appears the bug exists in latest trees.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36008"
},
{
"cve": "CVE-2024-36015",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36016",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix possible out-of-bounds in gsm0_receive()\n\nAssuming the following:\n- side A configures the n_gsm in basic option mode\n- side B sends the header of a basic option mode frame with data length 1\n- side A switches to advanced option mode\n- side B sends 2 data bytes which exceeds gsm-\u003elen\n Reason: gsm-\u003elen is not used in advanced option mode.\n- side A switches to basic option mode\n- side B keeps sending until gsm0_receive() writes past gsm-\u003ebuf\n Reason: Neither gsm-\u003estate nor gsm-\u003elen have been reset after\n reconfiguration.\n\nFix this by changing gsm-\u003ecount to gsm-\u003elen comparison from equal to less\nthan. Also add upper limit checks against the constant MAX_MRU in\ngsm0_receive() and gsm1_receive() to harden against memory corruption of\ngsm-\u003elen and gsm-\u003emru.\n\nAll other checks remain as we still need to limit the data according to the\nuser configuration and actual payload size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36016"
},
{
"cve": "CVE-2024-36017",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a struct ifla_vf_vlan_info so the size of such attribute needs to be at least of sizeof(struct ifla_vf_vlan_info) which is 14 bytes. The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes) which is less than sizeof(struct ifla_vf_vlan_info) so this validation is not enough and a too small attribute might be cast to a struct ifla_vf_vlan_info, this might result in an out of bands read access when accessing the saved (casted) entry in ivvl.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36017"
},
{
"cve": "CVE-2024-36031",
"cwe": {
"id": "CWE-324",
"name": "Use of a Key Past its Expiration Date"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix overwrite of key expiration on instantiation\n\nThe expiry time of a key is unconditionally overwritten during\ninstantiation, defaulting to turn it permanent. This causes a problem\nfor DNS resolution as the expiration set by user-space is overwritten to\nTIME64_MAX, disabling further DNS updates. Fix this by restoring the\ncondition that key_set_expiry is only called when the pre-parser sets a\nspecific expiry.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36031"
},
{
"cve": "CVE-2024-36270",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports: general protection fault, probably for non-canonical address",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36270"
},
{
"cve": "CVE-2024-36286",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36286"
},
{
"cve": "CVE-2024-36288",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token-\u003epages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f].",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36288"
},
{
"cve": "CVE-2024-36484",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36484"
},
{
"cve": "CVE-2024-36489",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tls: missing memory barrier in tls_init. In tls_init(), a write memory barrier is missing, and store-store reordering may cause NULL dereference in tls_{setsockopt,getsockopt}.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36489"
},
{
"cve": "CVE-2024-36883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix out-of-bounds access in ops_init\n\nnet_alloc_generic is called by net_alloc, which is called without any\nlocking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It\nis read twice, first to allocate an array, then to set s.len, which is\nlater used to limit the bounds of the array access.\n\nIt is possible that the array is allocated and another thread is\nregistering a new pernet ops, increments max_gen_ptrs, which is then used\nto set s.len with a larger than allocated length for the variable array.\n\nFix it by reading max_gen_ptrs only once in net_alloc_generic. If\nmax_gen_ptrs is later incremented, it will be caught in net_assign_generic.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36883"
},
{
"cve": "CVE-2024-36886",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix UAF in error path\n\nSam Page (sam4k) working with Trend Micro Zero Day Initiative reported\na UAF in the tipc_buf_append() error path:\n\nBUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0\nlinux/net/core/skbuff.c:1183\nRead of size 8 at addr ffff88804d2a7c80 by task poc/8034\n\nCPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.0-debian-1.16.0-5 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n __dump_stack linux/lib/dump_stack.c:88\n dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106\n print_address_description linux/mm/kasan/report.c:377\n print_report+0xc4/0x620 linux/mm/kasan/report.c:488\n kasan_report+0xda/0x110 linux/mm/kasan/report.c:601\n kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183\n skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026\n skb_release_all linux/net/core/skbuff.c:1094\n __kfree_skb linux/net/core/skbuff.c:1108\n kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144\n kfree_skb linux/./include/linux/skbuff.h:1244\n tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186\n tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324\n tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824\n tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159\n tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390\n udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108\n udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186\n udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346\n __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422\n ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205\n ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254\n dst_input linux/./include/net/dst.h:461\n ip_rcv_finish linux/net/ipv4/ip_input.c:449\n NF_HOOK linux/./include/linux/netfilter.h:314\n NF_HOOK linux/./include/linux/netfilter.h:308\n ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569\n __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534\n __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648\n process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976\n __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576\n napi_poll linux/net/core/dev.c:6645\n net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781\n __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553\n do_softirq linux/kernel/softirq.c:454\n do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381\n local_bh_enable linux/./include/linux/bottom_half.h:33\n rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851\n __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378\n dev_queue_xmit linux/./include/linux/netdevice.h:3169\n neigh_hh_output linux/./include/net/neighbour.h:526\n neigh_output linux/./include/net/neighbour.h:540\n ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235\n __ip_finish_output linux/net/ipv4/ip_output.c:313\n __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295\n ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323\n NF_HOOK_COND linux/./include/linux/netfilter.h:303\n ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433\n dst_output linux/./include/net/dst.h:451\n ip_local_out linux/net/ipv4/ip_output.c:129\n ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492\n udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963\n udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250\n inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850\n sock_sendmsg_nosec linux/net/socket.c:730\n __sock_sendmsg linux/net/socket.c:745\n __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191\n __do_sys_sendto linux/net/socket.c:2203\n __se_sys_sendto linux/net/socket.c:2199\n __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199\n do_syscall_x64 linux/arch/x86/entry/common.c:52\n do_syscall_\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36886"
},
{
"cve": "CVE-2024-36889",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: ensure snd_nxt is properly initialized on connect\n\nChristoph reported a splat hinting at a corrupted snd_una:\n\n WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n Modules linked in:\n CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted 6.9.0-rc1-gbbeac67456c9 #59\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014\n Workqueue: events mptcp_worker\n RIP: 0010:__mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005\n Code: be 06 01 00 00 bf 06 01 00 00 e8 a8 12 e7 fe e9 00 fe ff ff e8\n \t8e 1a e7 fe 0f b7 ab 3e 02 00 00 e9 d3 fd ff ff e8 7d 1a e7 fe\n \t\u003c0f\u003e 0b 4c 8b bb e0 05 00 00 e9 74 fc ff ff e8 6a 1a e7 fe 0f 0b e9\n RSP: 0018:ffffc9000013fd48 EFLAGS: 00010293\n RAX: 0000000000000000 RBX: ffff8881029bd280 RCX: ffffffff82382fe4\n RDX: ffff8881003cbd00 RSI: ffffffff823833c3 RDI: 0000000000000001\n RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000\n R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888138ba8000\n R13: 0000000000000106 R14: ffff8881029bd908 R15: ffff888126560000\n FS: 0000000000000000(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f604a5dae38 CR3: 0000000101dac002 CR4: 0000000000170ef0\n Call Trace:\n \u003cTASK\u003e\n __mptcp_clean_una_wakeup net/mptcp/protocol.c:1055 [inline]\n mptcp_clean_una_wakeup net/mptcp/protocol.c:1062 [inline]\n __mptcp_retrans+0x7f/0x7e0 net/mptcp/protocol.c:2615\n mptcp_worker+0x434/0x740 net/mptcp/protocol.c:2767\n process_one_work+0x1e0/0x560 kernel/workqueue.c:3254\n process_scheduled_works kernel/workqueue.c:3335 [inline]\n worker_thread+0x3c7/0x640 kernel/workqueue.c:3416\n kthread+0x121/0x170 kernel/kthread.c:388\n ret_from_fork+0x44/0x50 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n \u003c/TASK\u003e\n\nWhen fallback to TCP happens early on a client socket, snd_nxt\nis not yet initialized and any incoming ack will copy such value\ninto snd_una. If the mptcp worker (dumbly) tries mptcp-level\nre-injection after such ack, that would unconditionally trigger a send\nbuffer cleanup using \u0027bad\u0027 snd_una values.\n\nWe could easily disable re-injection for fallback sockets, but such\ndumb behavior already helped catching a few subtle issues and a very\nlow to zero impact in practice.\n\nInstead address the issue always initializing snd_nxt (and write_seq,\nfor consistency) at connect time.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36889"
},
{
"cve": "CVE-2024-36901",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a chance that ip6_dst_idev() returns NULL in ip6_output().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36901"
},
{
"cve": "CVE-2024-36902",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Linux kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is able to trigger the following crash [1], caused by unsafe ip6_dst_idev() use. Indeed ip6_dst_idev() can return NULL, and must always be checked.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36902"
},
{
"cve": "CVE-2024-36904",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36905",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36905"
},
{
"cve": "CVE-2024-36916",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: blk-iocost: avoid out of bounds shift UBSAN catches undefined behavior in blk-iocost, where sometimes iocg-\u003edelay is shifted right by a number that is too large, resulting in undefined behavior on some architectures. [ 186.556576] ------------[ cut here ]------------ UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23 shift exponent 64 is too large for 64-bit type \u0027u64\u0027 (aka \u0027unsigned long long\u0027) CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S E N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1 Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020 Call Trace: \u003cIRQ\u003e dump_stack_lvl+0x8f/0xe0 __ubsan_handle_shift_out_of_bounds+0x22c/0x280 iocg_kick_delay+0x30b/0x310 ioc_timer_fn+0x2fb/0x1f80 __run_timer_base+0x1b6/0x250 ... Avoid that undefined behavior by simply taking the \"delay = 0\" branch if the shift is too large. I am not sure what the symptoms of an undefined value delay will be, but I suspect it could be more than a little annoying to debug.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36916"
},
{
"cve": "CVE-2024-36929",
"cwe": {
"id": "CWE-237",
"name": "Improper Handling of Structural Elements"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: core: reject skb_copy(_expand) for fraglist GSO skbs SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become invalid. Return NULL if such an skb is passed to skb_copy or skb_copy_expand, in order to prevent a crash on a potential later call to skb_gso_segment.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36929"
},
{
"cve": "CVE-2024-36933",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnsh: Restore skb-\u003e{protocol,data,mac_header} for outer header in nsh_gso_segment().\n\nsyzbot triggered various splats (see [0] and links) by a crafted GSO\npacket of VIRTIO_NET_HDR_GSO_UDP layering the following protocols:\n\n ETH_P_8021AD + ETH_P_NSH + ETH_P_IPV6 + IPPROTO_UDP\n\nNSH can encapsulate IPv4, IPv6, Ethernet, NSH, and MPLS. As the inner\nprotocol can be Ethernet, NSH GSO handler, nsh_gso_segment(), calls\nskb_mac_gso_segment() to invoke inner protocol GSO handlers.\n\nnsh_gso_segment() does the following for the original skb before\ncalling skb_mac_gso_segment()\n\n 1. reset skb-\u003enetwork_header\n 2. save the original skb-\u003e{mac_heaeder,mac_len} in a local variable\n 3. pull the NSH header\n 4. resets skb-\u003emac_header\n 5. set up skb-\u003emac_len and skb-\u003eprotocol for the inner protocol.\n\nand does the following for the segmented skb\n\n 6. set ntohs(ETH_P_NSH) to skb-\u003eprotocol\n 7. push the NSH header\n 8. restore skb-\u003emac_header\n 9. set skb-\u003emac_header + mac_len to skb-\u003enetwork_header\n 10. restore skb-\u003emac_len\n\nThere are two problems in 6-7 and 8-9.\n\n (a)\n After 6 \u0026 7, skb-\u003edata points to the NSH header, so the outer header\n (ETH_P_8021AD in this case) is stripped when skb is sent out of netdev.\n\n Also, if NSH is encapsulated by NSH + Ethernet (so NSH-Ethernet-NSH),\n skb_pull() in the first nsh_gso_segment() will make skb-\u003edata point\n to the middle of the outer NSH or Ethernet header because the Ethernet\n header is not pulled by the second nsh_gso_segment().\n\n (b)\n While restoring skb-\u003e{mac_header,network_header} in 8 \u0026 9,\n nsh_gso_segment() does not assume that the data in the linear\n buffer is shifted.\n\n However, udp6_ufo_fragment() could shift the data and change\n skb-\u003emac_header accordingly as demonstrated by syzbot.\n\n If this happens, even the restored skb-\u003emac_header points to\n the middle of the outer header.\n\nIt seems nsh_gso_segment() has never worked with outer headers so far.\n\nAt the end of nsh_gso_segment(), the outer header must be restored for\nthe segmented skb, instead of the NSH header.\n\nTo do that, let\u0027s calculate the outer header position relatively from\nthe inner header and set skb-\u003e{data,mac_header,protocol} properly.\n\n[0]:\nBUG: KMSAN: uninit-value in ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]\nBUG: KMSAN: uninit-value in ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\nBUG: KMSAN: uninit-value in ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668\n ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]\n ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]\n ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668\n ipvlan_start_xmit+0x5c/0x1a0 drivers/net/ipvlan/ipvlan_main.c:222\n __netdev_start_xmit include/linux/netdevice.h:4989 [inline]\n netdev_start_xmit include/linux/netdevice.h:5003 [inline]\n xmit_one net/core/dev.c:3547 [inline]\n dev_hard_start_xmit+0x244/0xa10 net/core/dev.c:3563\n __dev_queue_xmit+0x33ed/0x51c0 net/core/dev.c:4351\n dev_queue_xmit include/linux/netdevice.h:3171 [inline]\n packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3081 [inline]\n packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:3819 [inline]\n slab_alloc_node mm/slub.c:3860 [inline]\n __do_kmalloc_node mm/slub.c:3980 [inline]\n __kmalloc_node_track_caller+0x705/0x1000 mm/slub.c:4001\n kmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582\n __\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36933"
},
{
"cve": "CVE-2024-36934",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bna: ensure the copied buf is NUL terminated Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t ensure that the string is terminated inside the buffer, this can lead to OOB read when using sscanf. Fix this issue by using memdup_user_nul instead of memdup_user.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36934"
},
{
"cve": "CVE-2024-36938",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Denial of Service Vulnerability in the Linux Kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue Fix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which syzbot reported.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36938"
},
{
"cve": "CVE-2024-36940",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: pinctrl: core: delete incorrect free in pinctrl_enable() The \"pctldev\" struct is allocated in devm_pinctrl_register_and_init(). It\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(), so freeing it in pinctrl_enable() will lead to a double free. The devm_pinctrl_dev_release() function frees the pindescs and destroys the mutex as well.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphonet: fix rtm_phonet_notify() skb allocation\n\nfill_route() stores three components in the skb:\n\n- struct rtmsg\n- RTA_DST (u8)\n- RTA_OIF (u32)\n\nTherefore, rtm_phonet_notify() should use\n\nNLMSG_ALIGN(sizeof(struct rtmsg)) +\nnla_total_size(1) +\nnla_total_size(4)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36946"
},
{
"cve": "CVE-2024-36954",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: fix a possible memleak in tipc_buf_append\n\n__skb_linearize() doesn\u0027t free the skb when it fails, so move\n\u0027*buf = NULL\u0027 after __skb_linearize(), so that the skb can be\nfreed on the err path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-36957",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-af: avoid off-by-one read from userspace\n\nWe try to access count + 1 byte from userspace with memdup_user(buffer,\ncount + 1). However, the userspace only provides buffer of count bytes and\nonly these count bytes are verified to be okay to access. To ensure the\ncopied buffer is NUL terminated, we use memdup_user_nul instead.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36957"
},
{
"cve": "CVE-2024-36959",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() If we fail to allocate propname buffer, we need to drop the reference count we just took. Because the pinctrl_dt_free_maps() includes the droping operation, here we call it directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36959"
},
{
"cve": "CVE-2024-36964",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000\u0027s perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36964"
},
{
"cve": "CVE-2024-36971",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "1. Describe what is the vulnerability about, e.g.:\n Affected devices do not properly validate input in the hack-me endpoint of the web service.\n\n 2. Describe what an attacker could do with it - e.g.:\n This could allow an unauthenticated remote attacker to execute arbitrary code on the device.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36971"
},
{
"cve": "CVE-2024-36974",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP. If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided, taprio_parse_mqprio_opt() must validate it, or userspace can inject arbitrary data to the kernel, the second time taprio_change() is called. First call (with valid attributes) sets dev-\u003enum_tc to a non zero value. Second call (with arbitrary mqprio attributes) returns early from taprio_parse_mqprio_opt() and bad things can happen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36974"
},
{
"cve": "CVE-2024-36978",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: sched: sch_multiq: possible OOB write in multiq_tune() q-\u003ebands will be assigned to qopt-\u003ebands to execute subsequent code logic after kmalloc. So the old q-\u003ebands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-36978"
},
{
"cve": "CVE-2024-37356",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-37356"
},
{
"cve": "CVE-2024-38381",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfc: nci: Fix uninit-value in nci_rx_work syzbot reported the following uninit-value access issue [1] nci_rx_work() parses received packet from ndev-\u003erx_q. It should be validated header size, payload size and total packet size before processing the packet. If an invalid packet is detected, it should be silently discarded.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38381"
},
{
"cve": "CVE-2024-38555",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Discard command completions in internal error\n\nFix use after free when FW completion arrives while device is in\ninternal error state. Avoid calling completion handler in this case,\nsince the device will flush the command interface and trigger all\ncompletions manually.\n\nKernel log:\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\n...\nRIP: 0010:refcount_warn_saturate+0xd8/0xe0\n...\nCall Trace:\n\u003cIRQ\u003e\n? __warn+0x79/0x120\n? refcount_warn_saturate+0xd8/0xe0\n? report_bug+0x17c/0x190\n? handle_bug+0x3c/0x60\n? exc_invalid_op+0x14/0x70\n? asm_exc_invalid_op+0x16/0x20\n? refcount_warn_saturate+0xd8/0xe0\ncmd_ent_put+0x13b/0x160 [mlx5_core]\nmlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]\ncmd_comp_notifier+0x1f/0x30 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nmlx5_eq_async_int+0xf6/0x290 [mlx5_core]\nnotifier_call_chain+0x35/0xb0\natomic_notifier_call_chain+0x16/0x20\nirq_int_handler+0x19/0x30 [mlx5_core]\n__handle_irq_event_percpu+0x4b/0x160\nhandle_irq_event+0x2e/0x80\nhandle_edge_irq+0x98/0x230\n__common_interrupt+0x3b/0xa0\ncommon_interrupt+0x7b/0xa0\n\u003c/IRQ\u003e\n\u003cTASK\u003e\nasm_common_interrupt+0x22/0x40",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38555"
},
{
"cve": "CVE-2024-38558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: openvswitch: fix overwriting ct original tuple for ICMPv6 OVS_PACKET_CMD_EXECUTE has 3 main attributes: - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format. - OVS_PACKET_ATTR_PACKET - Binary packet content. - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet. OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure with the metadata like conntrack state, input port, recirculation id, etc.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38558"
},
{
"cve": "CVE-2024-38578",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ecryptfs: Fix buffer size for tag 66 packet The \u0027TAG 66 Packet Format\u0027 description is missing the cipher code and checksum fields that are packed into the message packet. As a result, the buffer allocated for the packet is 3 bytes too small and write_tag_66_packet() will write up to 3 bytes past the end of the buffer. Fix this by increasing the size of the allocation so the whole packet will always fit in the buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38578"
},
{
"cve": "CVE-2024-38579",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38579"
},
{
"cve": "CVE-2024-38586",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "r8169: possible ring buffer corruption on fragmented Tx packets. Vulnerability on the RTL8125b when transmitting small fragmented packets, whereby invalid entries were inserted into the transmit ring buffer, subsequently leading to calls to dma_unmap_single() with a null address. This was caused by rtl8169_start_xmit() not noticing changes to nr_frags which may occur when small packets are padded (to work around hardware quirks) in rtl8169_tso_csum_v2().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38586"
},
{
"cve": "CVE-2024-38587",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nspeakup: Fix sizeof() vs ARRAY_SIZE() bug\r\n\r\nThe \"buf\" pointer is an array of u16 values. This code should be\r\nusing ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),\r\notherwise it can the still got out of bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38587"
},
{
"cve": "CVE-2024-38589",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "netrom: fix possible dead-lock in nr_rt_ioctl() syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1] Make sure we always acquire nr_node_list_lock before nr_node_lock(nr_node).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38589"
},
{
"cve": "CVE-2024-38590",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Modify the print level of CQE error\n\nToo much print may lead to a panic in kernel. Change ibdev_err() to\nibdev_err_ratelimited(), and change the printing level of cqe dump\nto debug level.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38590"
},
{
"cve": "CVE-2024-38596",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38596"
},
{
"cve": "CVE-2024-38597",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: sungem: remove .ndo_poll_controller to avoid deadlocks\n\nErhard reports netpoll warnings from sungem:\n\n netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)\n WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c\n\ngem_poll_controller() disables interrupts, which may sleep.\nWe can\u0027t sleep in netpoll, it has interrupts disabled completely.\nStrangely, gem_poll_controller() doesn\u0027t even poll the completions,\nand instead acts as if an interrupt has fired so it just schedules\nNAPI and exits. None of this has been necessary for years, since\nnetpoll invokes NAPI directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38597"
},
{
"cve": "CVE-2024-38598",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38601",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Fix a race between readers and resize checks\n\nThe reader code in rb_get_reader_page() swaps a new reader page into the\nring buffer by doing cmpxchg on old-\u003elist.prev-\u003enext to point it to the\nnew page. Following that, if the operation is successful,\nold-\u003elist.next-\u003eprev gets updated too. This means the underlying\ndoubly-linked list is temporarily inconsistent, page-\u003eprev-\u003enext or\npage-\u003enext-\u003eprev might not be equal back to page for some page in the\nring buffer.\n\nThe resize operation in ring_buffer_resize() can be invoked in parallel.\nIt calls rb_check_pages() which can detect the described inconsistency\nand stop further tracing:\n\n[ 190.271762] ------------[ cut here ]------------\n[ 190.271771] WARNING: CPU: 1 PID: 6186 at kernel/trace/ring_buffer.c:1467 rb_check_pages.isra.0+0x6a/0xa0\n[ 190.271789] Modules linked in: [...]\n[ 190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1 skx_edac(E):1\n[ 190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump: loaded Tainted: G E 6.9.0-rc6-default #5 158d3e1e6d0b091c34c3b96bfd99a1c58306d79f\n[ 190.272011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014\n[ 190.272015] RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0\n[ 190.272023] Code: [...]\n[ 190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206\n[ 190.272034] RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80\n[ 190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI: ffff8eba0004c700\n[ 190.272042] RBP: ffff8eba0004c700 R08: 0000000000010002 R09: 0000000000000000\n[ 190.272045] R10: 00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720\n[ 190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15: ffff8eba067a8000\n[ 190.272053] FS: 00007f1bd64752c0(0000) GS:ffff8eba7f680000(0000) knlGS:0000000000000000\n[ 190.272057] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 190.272061] CR2: 00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0\n[ 190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 190.272073] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 190.272077] Call Trace:\n[ 190.272098] \u003cTASK\u003e\n[ 190.272189] ring_buffer_resize+0x2ab/0x460\n[ 190.272199] __tracing_resize_ring_buffer.part.0+0x23/0xa0\n[ 190.272206] tracing_resize_ring_buffer+0x65/0x90\n[ 190.272216] tracing_entries_write+0x74/0xc0\n[ 190.272225] vfs_write+0xf5/0x420\n[ 190.272248] ksys_write+0x67/0xe0\n[ 190.272256] do_syscall_64+0x82/0x170\n[ 190.272363] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 190.272373] RIP: 0033:0x7f1bd657d263\n[ 190.272381] Code: [...]\n[ 190.272385] RSP: 002b:00007ffe72b643f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 190.272391] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1bd657d263\n[ 190.272395] RDX: 0000000000000002 RSI: 0000555a6eb538e0 RDI: 0000000000000001\n[ 190.272398] RBP: 0000555a6eb538e0 R08: 000000000000000a R09: 0000000000000000\n[ 190.272401] R10: 0000555a6eb55190 R11: 0000000000000246 R12: 00007f1bd6662500\n[ 190.272404] R13: 0000000000000002 R14: 00007f1bd6667c00 R15: 0000000000000002\n[ 190.272412] \u003c/TASK\u003e\n[ 190.272414] ---[ end trace 0000000000000000 ]---\n\nNote that ring_buffer_resize() calls rb_check_pages() only if the parent\ntrace_buffer has recording disabled. Recent commit d78ab792705c\n(\"tracing: Stop current tracer when resizing buffer\") causes that it is\nnow always the case which makes it more likely to experience this issue.\n\nThe window to hit this race is nonetheless very small. To help\nreproducing it, one can add a delay loop in rb_get_reader_page():\n\n ret = rb_head_page_replace(reader, cpu_buffer-\u003ereader_page);\n if (!ret)\n \tgoto spin;\n for (unsigned i = 0; i \u003c 1U \u003c\u003c 26; i++) /* inserted delay loop */\n \t__asm__ __volatile__ (\"\" : : : \"memory\");\n rb_list_head(reader-\u003elist.next)-\u003eprev = \u0026cpu_buffer-\u003ereader_page-\u003elist;\n\n.. \n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38601"
},
{
"cve": "CVE-2024-38612",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn\u0027t called. This issue exist since commit 46738b1317e1 (\"ipv6: sr: add option to control lwtunnel support\"), and commit 5559cea2d5aa (\"ipv6: sr: fix possible use-after-free and null-ptr-deref\") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38612"
},
{
"cve": "CVE-2024-38615",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "cpufreq: exit() callback is optional The exit() callback is optional and shouldn\u0027t be called without checking a valid pointer first. Also, we must clear freq_table pointer even if the exit() callback isn\u0027t present.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38615"
},
{
"cve": "CVE-2024-38619",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb-storage: alauda: Check whether the media is initialized. The member \"uzonesize\" of struct alauda_info will remain 0 if alauda_init_media() fails, potentially causing divide errors in alauda_read_data() and alauda_write_lba().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38619"
},
{
"cve": "CVE-2024-38627",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstm class: Fix a double free in stm_register_device()\n\nThe put_device(\u0026stm-\u003edev) call will trigger stm_device_release() which\nfrees \"stm\" so the vfree(stm) on the next line is a double free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38627"
},
{
"cve": "CVE-2024-38633",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: max3100: Update uart_driver_registered on driver removal\n\nThe removal of the last MAX3100 device triggers the removal of\nthe driver. However, code doesn\u0027t update the respective global\nvariable and after insmod \u2014 rmmod \u2014 insmod cycle the kernel\noopses:\n\n max3100 spi-PRP0001:01: max3100_probe: adding port 0\n BUG: kernel NULL pointer dereference, address: 0000000000000408\n ...\n RIP: 0010:serial_core_register_port+0xa0/0x840\n ...\n max3100_probe+0x1b6/0x280 [max3100]\n spi_probe+0x8d/0xb0\n\nUpdate the actual state so next time UART driver will be registered\nagain.\n\nHugo also noticed, that the error path in the probe also affected\nby having the variable set, and not cleared. Instead of clearing it\nmove the assignment after the successfull uart_register_driver() call.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38633"
},
{
"cve": "CVE-2024-38634",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: max3100: Lock port-\u003elock when calling uart_handle_cts_change()\n\nuart_handle_cts_change() has to be called with port lock taken,\nSince we run it in a separate work, the lock may not be taken at\nthe time of running. Make sure that it\u0027s taken by explicitly doing\nthat. Without it we got a splat:\n\n WARNING: CPU: 0 PID: 10 at drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0\n ...\n Workqueue: max3100-0 max3100_work [max3100]\n RIP: 0010:uart_handle_cts_change+0xa6/0xb0\n ...\n max3100_handlerx+0xc5/0x110 [max3100]\n max3100_work+0x12a/0x340 [max3100]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38634"
},
{
"cve": "CVE-2024-38637",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngreybus: lights: check return of get_channel_from_mode\n\nIf channel for the given node is not found we return null from\nget_channel_from_mode. Make sure we validate the return pointer\nbefore using it in two of the missing places.\n\nThis was originally reported in [0]:\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[0] https://lore.kernel.org/all/20240301190425.120605-1-m.lobanov@rosalinux.ru",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38637"
},
{
"cve": "CVE-2024-38659",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "enic: Validate length of nl attributes in enic_set_vf_port enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE is of length PORT_PROFILE_MAX and that the nl attributes IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX. These attributes are validated (in the function do_setlink in rtnetlink.c) using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation using the policy is for the max size of the attributes and not on exact size so the length of these attributes might be less than the sizes that enic_set_vf_port expects. This might cause an out of bands read access in the memcpys of the data of these attributes in enic_set_vf_port.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38659"
},
{
"cve": "CVE-2024-38662",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bpf: Allow delete from sockmap/sockhash only if update is allowed. We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule violation by performing a map_delete on a sockmap/sockhash. We don\u0027t intend to support this artificial use scenario. Extend the existing verifier allowed-program-type check for updating sockmap/sockhash to also cover deleting from a map. From now on only BPF programs which were previously allowed to update sockmap/sockhash can delete from these map types.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38662"
},
{
"cve": "CVE-2024-38780",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don\u0027t enable IRQ from sync_print_obj().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-38780"
},
{
"cve": "CVE-2024-39276",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix mb_cache_entry\u0027s e_refcnt leak in ext4_xattr_block_cache_find()\n\nSyzbot reports a warning as follows:\n\n============================================\nWARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290\nModules linked in:\nCPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7\nRIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419\nCall Trace:\n \u003cTASK\u003e\n ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375\n generic_shutdown_super+0x136/0x2d0 fs/super.c:641\n kill_block_super+0x44/0x90 fs/super.c:1675\n ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327\n[...]\n============================================\n\nThis is because when finding an entry in ext4_xattr_block_cache_find(), if\next4_sb_bread() returns -ENOMEM, the ce\u0027s e_refcnt, which has already grown\nin the __entry_find(), won\u0027t be put away, and eventually trigger the above\nissue in mb_cache_destroy() due to reference count leakage.\n\nSo call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39276"
},
{
"cve": "CVE-2024-39292",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winch IRQ is racy, an interrupt may occur before the winch is added to the winch_handlers list. If that happens, register_winch_irq() adds to that list a winch that is scheduled to be (or has already been) freed, causing a panic later in winch_cleanup(). Avoid the race by adding the winch to the winch_handlers list before registering the IRQ, and rolling back if um_request_irq() fails.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39292"
},
{
"cve": "CVE-2024-39301",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix uninit-value in p9_client_rpc()\n\nSyzbot with the help of KMSAN reported the following error:\n\nBUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:146 [inline]\nBUG: KMSAN: uninit-value in p9_client_rpc+0x1314/0x1340 net/9p/client.c:754\n trace_9p_client_res include/trace/events/9p.h:146 [inline]\n p9_client_rpc+0x1314/0x1340 net/9p/client.c:754\n p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031\n v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410\n v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122\n legacy_get_tree+0x114/0x290 fs/fs_context.c:662\n vfs_get_tree+0xa7/0x570 fs/super.c:1797\n do_new_mount+0x71f/0x15e0 fs/namespace.c:3352\n path_mount+0x742/0x1f20 fs/namespace.c:3679\n do_mount fs/namespace.c:3692 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x725/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598\n __alloc_pages_node include/linux/gfp.h:238 [inline]\n alloc_pages_node include/linux/gfp.h:261 [inline]\n alloc_slab_page mm/slub.c:2175 [inline]\n allocate_slab mm/slub.c:2338 [inline]\n new_slab+0x2de/0x1400 mm/slub.c:2391\n ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525\n __slab_alloc mm/slub.c:3610 [inline]\n __slab_alloc_node mm/slub.c:3663 [inline]\n slab_alloc_node mm/slub.c:3835 [inline]\n kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852\n p9_tag_alloc net/9p/client.c:278 [inline]\n p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641\n p9_client_rpc+0x27e/0x1340 net/9p/client.c:688\n p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031\n v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410\n v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122\n legacy_get_tree+0x114/0x290 fs/fs_context.c:662\n vfs_get_tree+0xa7/0x570 fs/super.c:1797\n do_new_mount+0x71f/0x15e0 fs/namespace.c:3352\n path_mount+0x742/0x1f20 fs/namespace.c:3679\n do_mount fs/namespace.c:3692 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x725/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nIf p9_check_errors() fails early in p9_client_rpc(), req-\u003erc.tag\nwill not be properly initialized. However, trace_9p_client_res()\nends up trying to print it out anyway before p9_client_rpc()\nfinishes.\n\nFix this issue by assigning default values to p9_fcall fields\nsuch as \u0027tag\u0027 and (just in case KMSAN unearths something new) \u0027id\u0027\nduring the tag allocation stage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39301"
},
{
"cve": "CVE-2024-39468",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "smb: client: Deadlock in smb2_find_smb_tcon().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39468"
},
{
"cve": "CVE-2024-39475",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: savage: Handle err return when savagefb_check_var failed\n\nThe commit 04e5eac8f3ab(\"fbdev: savage: Error out if pixclock equals zero\")\nchecks the value of pixclock to avoid divide-by-zero error. However\nthe function savagefb_probe doesn\u0027t handle the error return of\nsavagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39475"
},
{
"cve": "CVE-2024-39476",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmd/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"1",
"3",
"4"
]
},
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3",
"4",
"1"
]
}
],
"title": "CVE-2024-39476"
},
{
"cve": "CVE-2024-39480",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkdb: Fix buffer overflow during tab-complete\n\nCurrently, when the user attempts symbol completion with the Tab key, kdb\nwill use strncpy() to insert the completed symbol into the command buffer.\nUnfortunately it passes the size of the source buffer rather than the\ndestination to strncpy() with predictably horrible results. Most obviously\nif the command buffer is already full but cp, the cursor position, is in\nthe middle of the buffer, then we will write past the end of the supplied\nbuffer.\n\nFix this by replacing the dubious strncpy() calls with memmove()/memcpy()\ncalls plus explicit boundary checks to make sure we have enough space\nbefore we start moving characters around.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39480"
},
{
"cve": "CVE-2024-39482",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bcache: Variable length array abuse in btree_iter.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39482"
},
{
"cve": "CVE-2024-39487",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39487"
},
{
"cve": "CVE-2024-39489",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it\u0027s going to leak all that memory and the crypto tfms. Update seg6_hmac_exit to only free the memory when allocated, so we can reuse the code directly.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39489"
},
{
"cve": "CVE-2024-39493",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - Fix ADF_DEV_RESET_SYNC memory leak\n\nUsing completion_done to determine whether the caller has gone\naway only works after a complete call. Furthermore it\u0027s still\npossible that the caller has not yet called wait_for_completion,\nresulting in another potential UAF.\n\nFix this by making the caller use cancel_work_sync and then freeing\nthe memory safely.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39493"
},
{
"cve": "CVE-2024-39495",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "greybus: use-after-free vulnerability in gb_interface_release due to race condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39495"
},
{
"cve": "CVE-2024-39499",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "vmci: speculation leaks by sanitizing event in event_deliver(). event_msg is controlled by user-space, event_msg-\u003eevent_data.event is passed to event_deliver() and used as an index without sanitization, leading to information leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39499"
},
{
"cve": "CVE-2024-39501",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drivers: core: synchronize really_probe() and dev_uevent(). Synchronize the dev-\u003edriver usage in really_probe() and dev_uevent(). These can run in different threads, what can result in the following race condition for dev-\u003edriver uninitialization.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39501"
},
{
"cve": "CVE-2024-39502",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "ionic: use after netif_napi_del(). When queues are started, netif_napi_add() and napi_enable() are called. If there are 4 queues and only 3 queues are used for the current configuration, only 3 queues\u0027 napi should be registered and enabled. The ionic_qcq_enable() checks whether the .poll pointer is not NULL for enabling only the using queue\u0027 napi. Unused queues\u0027 napi will not be registered by netif_napi_add(), so the .poll pointer indicates NULL. But it couldn\u0027t distinguish whether the napi was unregistered or not because netif_napi_del() doesn\u0027t reset the .poll pointer to NULL. So, ionic_qcq_enable() calls napi_enable() for the queue, which was unregistered by netif_napi_del().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39502"
},
{
"cve": "CVE-2024-39503",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "netfilter: ipset: race between namespace cleanup and gc in the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the set type is waiting to run in rcu cleanup. The latter uses data from the destroyed set which thus leads use after free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39503"
},
{
"cve": "CVE-2024-39506",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet. In lio_vf_rep_copy_packet() pg_info-\u003epage is compared to a NULL value, but then it is unconditionally passed to skb_add_rx_frag(), which could lead to null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-39506"
},
{
"cve": "CVE-2024-40904",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "USB: class: cdc-wdm: CPU lockup caused by excessive log messages.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40904"
},
{
"cve": "CVE-2024-40905",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ipv6: possible race in __fib6_drop_pcpu_from().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40905"
},
{
"cve": "CVE-2024-40931",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "mptcp: ensure snd_una is properly initialized on connect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40931"
},
{
"cve": "CVE-2024-40945",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"notes": [
{
"category": "summary",
"text": "iommu: Return right value in iommu_sva_bind_device() iommu_sva_bind_device() should return either a sva bond handle or an ERR_PTR value in error cases. Existing drivers (idxd and uacce) only check the return value with IS_ERR(). This could potentially lead to a kernel NULL pointer dereference issue if the function returns NULL instead of an error pointer. In reality, this doesn\u0027t cause any problems because iommu_sva_bind_device() only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40945"
},
{
"cve": "CVE-2024-40947",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ima: Avoid blocking in RCU read-side critical section, a panic happens in ima_match_policy.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40947"
},
{
"cve": "CVE-2024-40958",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40958"
},
{
"cve": "CVE-2024-40959",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40959"
},
{
"cve": "CVE-2024-40960",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent possible NULL dereference in rt6_probe() syzbot caught a NULL dereference in rt6_probe() [1] Bail out if __in6_dev_get() returns NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40960"
},
{
"cve": "CVE-2024-40961",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ipv6: prevent possible NULL deref in fib6_nh_init() syzbot reminds us that in6_dev_get() can return NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40961"
},
{
"cve": "CVE-2024-40980",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "drop_monitor: replace spin_lock by raw_spin_lock trace_drop_common() is called with preemption disabled, and it acquires a spin_lock. This is problematic for RT kernels because spin_locks are sleeping locks in this configuration, which causes the following splat.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40980"
},
{
"cve": "CVE-2024-40983",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tipc: possible crash before doing decryption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40983"
},
{
"cve": "CVE-2024-40984",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "ACPICA: Revert \"ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.\"",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40984"
},
{
"cve": "CVE-2024-40990",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ptp: integer overflow in max_vclocks_store.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40990"
},
{
"cve": "CVE-2024-40995",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: act_api: possible infinite loop in tcf_idr_check_alloc().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-40995"
},
{
"cve": "CVE-2024-41000",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "block/ioctl: prefer different overflow check Running syzkaller with the newly reintroduced signed integer overflow sanitizer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41000"
},
{
"cve": "CVE-2024-41004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tracing: Build event generation tests only as modules The kprobes and synth event generation test modules add events and lock (get a reference) those event file reference in module init function, and unlock and delete it in module exit function. This is because those are designed for playing as modules. If we make those modules as built-in, those events are left locked in the kernel, and never be removed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41004"
},
{
"cve": "CVE-2024-41005",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "netpoll: race condition in netpoll_owner_active KCSAN detected a race condition in netpoll.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41005"
},
{
"cve": "CVE-2024-41006",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "netrom: a memory leak in nr_heartbeat_expiry().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41006"
},
{
"cve": "CVE-2024-41007",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "tcp: avoid too many retransmit packets If a TCP socket is using TCP_USER_TIMEOUT.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41007"
},
{
"cve": "CVE-2024-41009",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "bpf: Fix overrunning reservations in ringbuf.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41009"
},
{
"cve": "CVE-2024-41012",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "filelock: Remove locks reliably when fcntl/close race is detected When fcntl_setlk() races with close(), it removes the created lock with do_lock_file_wait().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41012"
},
{
"cve": "CVE-2024-41020",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "filelock: race condition vulnerability between fcntl and close operations, which can lead to issues in the recovery compatibility path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41020"
},
{
"cve": "CVE-2024-41035",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "USB: core: duplicate endpoint bug.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41035"
},
{
"cve": "CVE-2024-41040",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/sched: UAF when resolving a clash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41040"
},
{
"cve": "CVE-2024-41041",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "udp: small race window.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41041"
},
{
"cve": "CVE-2024-41044",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ppp: claimed-as-LCP but actually malformed packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41044"
},
{
"cve": "CVE-2024-41046",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41046"
},
{
"cve": "CVE-2024-41049",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode\u0027s list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn\u0027t happen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41049"
},
{
"cve": "CVE-2024-41055",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 (\"mm/sparsemem: fix race in accessing memory_section-\u003eusage\") changed pfn_section_valid() to add a READ_ONCE() call around \"ms-\u003eusage\" to fix a race with section_deactivate() where ms-\u003eusage can be cleared. The READ_ONCE() call, by itself, is not enough to prevent NULL pointer dereference. We need to check its value before dereferencing it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41055"
},
{
"cve": "CVE-2024-41077",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "null_blk: validation error on block size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41077"
},
{
"cve": "CVE-2024-41081",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ila: block BH in ila_output().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41081"
},
{
"cve": "CVE-2024-41087",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ata: libata-core: double free on error.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41087"
},
{
"cve": "CVE-2024-41090",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tap: add missing verification for short frame. Missing to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()--\u003eskb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41090"
},
{
"cve": "CVE-2024-41091",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tun: add missing verification for short frame. Missing to check against the validity of the frame length in the tun_xdp_one() path could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one--\u003eeth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either causeout-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41091"
},
{
"cve": "CVE-2024-41097",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: atm: cxacru: incomplete endpoint checking in cxacru_bind().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-41097"
},
{
"cve": "CVE-2024-42070",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: can: j1939: unused data in j1939_send_one().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42076"
},
{
"cve": "CVE-2024-42082",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "xdp: unused WARN() in __xdp_reg_mem_model().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42082"
},
{
"cve": "CVE-2024-42084",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "ftruncate: passing a negative length accidentally succeeds in truncating to file size between 2GiB and 4GiB.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42084"
},
{
"cve": "CVE-2024-42086",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "iio: chemical: bme680: overflows in compensate() functions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42086"
},
{
"cve": "CVE-2024-42089",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: fsl-asoc-card: set priv-\u003epdev before using it\n\npriv-\u003epdev pointer was set after being used in\nfsl_asoc_card_audmux_init().\nMove this assignment at the start of the probe function, so\nsub-functions can correctly use pdev through priv.\n\nfsl_asoc_card_audmux_init() dereferences priv-\u003epdev to get access to the\ndev struct, used with dev_err macros.\nAs priv is zero-initialised, there would be a NULL pointer dereference.\nNote that if priv-\u003edev is dereferenced before assignment but never used,\nfor example if there is no error to be printed, the driver won\u0027t crash\nprobably due to compiler optimisations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42089"
},
{
"cve": "CVE-2024-42092",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "gpio: davinci: There can be out of chips-\u003eirqs array boundaries access in davinci_gpio_probe().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42092"
},
{
"cve": "CVE-2024-42093",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/dpaa2: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42093"
},
{
"cve": "CVE-2024-42094",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net/iucv: explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack can cause potential stack overflow.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42094"
},
{
"cve": "CVE-2024-42095",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "serial: 8250_omap: Erroneous timeout can be triggered, and it may lead to storm of interrupts.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42095"
},
{
"cve": "CVE-2024-42102",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\"\n\nPatch series \"mm: Avoid possible overflows in dirty throttling\".\n\nDirty throttling logic assumes dirty limits in page units fit into\n32-bits. This patch series makes sure this is true (see patch 2/2 for\nmore details).\n\n\nThis patch (of 2):\n\nThis reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.\n\nThe commit is broken in several ways. Firstly, the removed (u64) cast\nfrom the multiplication will introduce a multiplication overflow on 32-bit\narchs if wb_thresh * bg_thresh \u003e= 1\u003c\u003c32 (which is actually common - the\ndefault settings with 4GB of RAM will trigger this). Secondly, the\ndiv64_u64() is unnecessarily expensive on 32-bit archs. We have\ndiv64_ul() in case we want to be safe \u0026 cheap. Thirdly, if dirty\nthresholds are larger than 1\u003c\u003c32 pages, then dirty balancing is going to\nblow up in many other spectacular ways anyway so trying to fix one\npossible overflow is just moot.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42102"
},
{
"cve": "CVE-2024-42106",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: inet_diag: Initialize pad field in struct inet_diag_req_v2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42106"
},
{
"cve": "CVE-2024-42131",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic The dirty throttling logic is interspersed with assumptions that dirty limits in PAGE_SIZE units fit into 32-bit (so that various multiplications fit into 64-bits). If limits end up being larger, we will hit overflows, possible divisions by 0 etc. Fix these problems by never allowing so large dirty limits as they have dubious practical value anyway. For dirty_bytes / dirty_background_bytes interfaces we can just refuse to set so large limits. For dirty_ratio / dirty_background_ratio it isn\u0027t so simple as the dirty limit is computed from the amount of available memory which can change due to memory hotplug etc. So when converting dirty limits from ratios to numbers of pages, we just don\u0027t allow the result to exceed UINT_MAX. This is root-only triggerable problem which occurs when the operator sets dirty limits to \u003e16 TB.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42131"
},
{
"cve": "CVE-2024-42145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "IB/core: an unbounded UMAD receive list, poses a risk of uncontrolled growth.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42145"
},
{
"cve": "CVE-2024-42148",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bnx2x: multiple UBSAN array-index-out-of-bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42148"
},
{
"cve": "CVE-2024-42152",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nvmet: possible leak when destroy a ctrl during qp establishment.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42152"
},
{
"cve": "CVE-2024-42153",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "i2c: pnx: potential deadlock warning from del_timer_sync() call in isr.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42153"
},
{
"cve": "CVE-2024-42154",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don\u0027t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn\u0027t have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42154"
},
{
"cve": "CVE-2024-42161",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42161"
},
{
"cve": "CVE-2024-42223",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "media: dvb-frontends: tda10048: integer overflow state-\u003extal_hz can be up to 16M, so it can overflow a 32 bit integer when multiplied by pll_mfactor.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42223"
},
{
"cve": "CVE-2024-42229",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "crypto: aead,cipher - key buffer after use not zeroized.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42229"
},
{
"cve": "CVE-2024-42232",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "libceph: fix race between delayed_work() and ceph_monc_stop() The way the delayed work is handled in ceph_monc_stop() is prone to races with mon_fault() and possibly also finish_hunting(). Both of these can requeue the delayed work which wouldn\u0027t be canceled by any of the following code in case that happens after cancel_delayed_work_sync() runs -- __close_session() doesn\u0027t mess with the delayed work in order to avoid interfering with the hunting interval logic. This part was missed in(libceph: behave in mon_fault() if cur_mon \u003c \") and use-after-free can still ensue on monc and objects that hang off of it, with monc-\u003e auth and monc-\u003emonmap being particularly susceptible to quickly being reused.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42232"
},
{
"cve": "CVE-2024-42236",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: gadget: configfs: OOB read/write in usb_string_copy().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42236"
},
{
"cve": "CVE-2024-42244",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "USB: serial: mos7840: fix crash on resume Since(\"USB: serial: use generic method if no alternative is provided in usb serial layer\"), USB serial core calls the generic resume implementation when the driver has not provided one. This can trigger a crash on resume with mos7840 since support for multiple read URBs was added back in 2011. Specifically, both port read URBs are now submitted on resume for open ports, but the context pointer of the second URB is left set to the core rather than mos7840 port structure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42244"
},
{
"cve": "CVE-2024-42247",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "wireguard: allowedips: unaligned 64-bit memory accesses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-42247"
},
{
"cve": "CVE-2024-43861",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: usb: qmi_wwan: memory leak for not ip packets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43861"
},
{
"cve": "CVE-2024-43871",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43871"
},
{
"cve": "CVE-2024-43880",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "mlxsw: spectrum_acl_erp: object nesting warning.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43880"
},
{
"cve": "CVE-2024-43882",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "exec: the execution may gain unintended privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43882"
},
{
"cve": "CVE-2024-43883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: vhci-hcd: vulnerability due to the vhci-hcd driver dropping references before new ones were gained, potentially leading to the use of stale pointers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43883"
},
{
"cve": "CVE-2024-43889",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "padata: vulnerability due to a possible divide-by-zero error in padata_mt_helper() during bootup, caused by an uninitialized chunk_size being zero.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43889"
},
{
"cve": "CVE-2024-43890",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "tracing: vulnerability due to an overflow in get_free_elt(), which could lead to infinite loops and CPU hangs when the tracing map becomes full.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43890"
},
{
"cve": "CVE-2024-43893",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "serial: core: vulnerability due to a missing check for uartclk being zero, leading to a potential divide-by-zero error when calling ioctl TIOCSSERIAL with an invalid baud_base.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-43893"
},
{
"cve": "CVE-2024-44935",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "sctp: Fix null-ptr-deref in reuseport_add_sock(). A Null Pointer Dereference in reuseport_add_sock() while accessing sk2-\u003esk_reuseport_cb . The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. The second listen() calls reuseport_add_sock() with the first listener as sk2, where sk2-\u003esk_reuseport_cb is not expected to be cleared concurrently, but the close() does clear it by reuseport_detach_sock().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44935"
},
{
"cve": "CVE-2024-44944",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44944"
},
{
"cve": "CVE-2024-44949",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "parisc: fix a possible DMA corruption ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be possible that two unrelated 16-byte allocations share a cache line. If one of these allocations is written using DMA and the other is written using cached write, the value that was written with DMA may be corrupted.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44949"
},
{
"cve": "CVE-2024-44952",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "driver core: vulnerability due to a potential deadlock due to improper handling of device attributes and driver detachment, which has been fixed by using synchronize_rcu() to prevent race conditions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44952"
},
{
"cve": "CVE-2024-44960",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: gadget: core: Check for unset descriptor. It needs to be reassured that the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn\u0027t properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the descriptor for the speed/endpoint are not found. No current gadget driver is known to have this problem, but this may cause a hard-to-find bug during development of new gadgets.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44960"
},
{
"cve": "CVE-2024-44971",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "net: dsa: bcm_sf2: vulnerability caused a memory leak by not decrementing the reference count after finding and removing PHY devices, which has been fixed by adding a call to phy_device_free() to balance the reference count.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44971"
},
{
"cve": "CVE-2024-44987",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent UAF in ip6_send_skb().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44987"
},
{
"cve": "CVE-2024-44989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44989"
},
{
"cve": "CVE-2024-44990",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there is an active slave before dereferencing the pointer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44990"
},
{
"cve": "CVE-2024-44995",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "net: hns3: a deadlock problem when config TC during resetting.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44995"
},
{
"cve": "CVE-2024-44998",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "atm: idt77252: use after free in dequeue_rx().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44998"
},
{
"cve": "CVE-2024-44999",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "gtp: missing network headers in gtp_dev_xmit().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-44999"
},
{
"cve": "CVE-2024-45003",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "vfs: Some filesystems(eg. ext4 with ea_inode feature, ubifs with xattr) may do inode lookup in the inode evicting callback function, if the inode lookup is operated under the inode lru traversing context, deadlock problems may happen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45003"
},
{
"cve": "CVE-2024-45006",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "xhci: Panther point NULL pointer deref at full-speed re-enumeration.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45006"
},
{
"cve": "CVE-2024-45008",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Input: missing limit on max slots results in too large allocation at input_mt_init_slots().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45008"
},
{
"cve": "CVE-2024-45021",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "memcg_write_event_control(): a user-triggerable oops.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45021"
},
{
"cve": "CVE-2024-45025",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE copy_fd_bitmaps.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45025"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-46674",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "usb: dwc3: st: fix probed platform device ref count on probe error path. The probe function never performs any paltform device allocation, thus error path \"undo_platform_dev_alloc\" is entirely bogus. It drops the reference count from the platform device being probed. If error path is triggered, this will lead to unbalanced device reference counts and premature release of device resources, thus possible use-after-free when releasing remaining devm-managed resources.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46674"
},
{
"cve": "CVE-2024-46675",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "usb: dwc3: core: A vulnerability where the USB core could access an invalid event buffer address during runtime suspend, potentially causing SMMU faults and other memory issues in Exynos platforms.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46675"
},
{
"cve": "CVE-2024-46676",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfc: pn533: Add poll mod list filling check. In case of im_protocols value is 1 and tm_protocols value is 0 this combination successfully passes the check \u0027if (!im_protocols \u0026\u0026 !tm_protocols)\u0027 in the nfc_start_poll(). But then after pn533_poll_create_mod_list() call in pn533_start_poll() poll mod list will remain empty and dev-\u003epoll_mod_count will remain 0 which lead to division by zero.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46676"
},
{
"cve": "CVE-2024-46677",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "gtp: fix NULL pointer dereference. When sockfd_lookup() fails, gtp_encap_enable_socket() returns a NULL pointer, but its callers only check for error pointers thus miss the NULL pointer case.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46677"
},
{
"cve": "CVE-2024-46679",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46679"
},
{
"cve": "CVE-2024-46685",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "pinctrl: single: fix NULL dereference in pcs_get_function(). pinmux_generic_get_function() can return NULL and the pointer \u0027function\u0027 was dereferenced without checking against NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46685"
},
{
"cve": "CVE-2024-46689",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "soc: qcom: cmd-db: Map shared memory as WC, not WB Linux does not write into cmd-db region. This region of memory is write protected by XPU. XPU may sometime falsely detect clean cache eviction as \"write\" into the write protected region leading to secure interrupt which causes an endless loop somewhere in Trust Zone.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"2",
"5"
],
"known_not_affected": [
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.1 or later version",
"product_ids": [
"2",
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109977557/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"2",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Misinformed",
"product_ids": [
"3"
]
}
],
"title": "CVE-2024-46689"
}
]
}
MSRC_CVE-2024-6232
Vulnerability from csaf_microsoft - Published: 2024-09-01 07:00 - Updated: 2024-10-15 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232 Regular-expression DoS when parsing TarFile headers - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-6232.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Regular-expression DoS when parsing TarFile headers",
"tracking": {
"current_release_date": "2024-10-15T00:00:00.000Z",
"generator": {
"date": "2025-10-20T02:08:32.516Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-6232",
"initial_release_date": "2024-09-01T07:00:00.000Z",
"revision_history": [
{
"date": "2024-09-26T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-10-15T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added python3 to Azure Linux 3.0\nAdded tensorflow to Azure Linux 3.0\nAdded python3 to CBL-Mariner 2.0"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 python3 3.9.19-5",
"product": {
"name": "\u003ccbl2 python3 3.9.19-5",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "cbl2 python3 3.9.19-5",
"product": {
"name": "cbl2 python3 3.9.19-5",
"product_id": "17242"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 python3 3.12.3-4",
"product": {
"name": "\u003cazl3 python3 3.12.3-4",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 python3 3.12.3-4",
"product": {
"name": "azl3 python3 3.12.3-4",
"product_id": "17637"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 python3 3.12.3-5",
"product": {
"name": "\u003cazl3 python3 3.12.3-5",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 python3 3.12.3-5",
"product": {
"name": "azl3 python3 3.12.3-5",
"product_id": "17545"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 python3 3.9.19-13",
"product": {
"name": "\u003ccbl2 python3 3.9.19-13",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 python3 3.9.19-13",
"product": {
"name": "cbl2 python3 3.9.19-13",
"product_id": "19681"
}
}
],
"category": "product_name",
"name": "python3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 tensorflow 2.16.1-7",
"product": {
"name": "\u003cazl3 tensorflow 2.16.1-7",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "azl3 tensorflow 2.16.1-7",
"product": {
"name": "azl3 tensorflow 2.16.1-7",
"product_id": "17541"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 tensorflow 2.16.1-9",
"product": {
"name": "\u003cazl3 tensorflow 2.16.1-9",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "17667"
}
}
],
"category": "product_name",
"name": "tensorflow"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 python3 3.9.19-5 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python3 3.9.19-5 as a component of CBL Mariner 2.0",
"product_id": "17242-17086"
},
"product_reference": "17242",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 tensorflow 2.16.1-7 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-7 as a component of Azure Linux 3.0",
"product_id": "17541-17084"
},
"product_reference": "17541",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python3 3.12.3-4 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python3 3.12.3-4 as a component of Azure Linux 3.0",
"product_id": "17637-17084"
},
"product_reference": "17637",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python3 3.12.3-5 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python3 3.12.3-5 as a component of Azure Linux 3.0",
"product_id": "17545-17084"
},
"product_reference": "17545",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17667-17084"
},
"product_reference": "17667",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 python3 3.9.19-13 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python3 3.9.19-13 as a component of CBL Mariner 2.0",
"product_id": "19681-17086"
},
"product_reference": "19681",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "general",
"text": "PSF",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17242-17086",
"17541-17084",
"17637-17084",
"17545-17084",
"17667-17084",
"19681-17086"
],
"known_affected": [
"17086-6",
"17084-5",
"17084-3",
"17084-4",
"17084-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232 Regular-expression DoS when parsing TarFile headers - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-6232.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-26T00:00:00.000Z",
"details": "3.9.19-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-6",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-09-26T00:00:00.000Z",
"details": "2.16.1-7:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-5",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-09-26T00:00:00.000Z",
"details": "3.12.3-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-4"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-6",
"17084-5",
"17084-3",
"17084-4",
"17084-2",
"17086-1"
]
}
],
"title": "Regular-expression DoS when parsing TarFile headers"
}
]
}
OPENSUSE-SU-2024:14327-1
Vulnerability from csaf_opensuse - Published: 2024-09-09 00:00 - Updated: 2024-09-09 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python39-3.9.19-8.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python39-3.9.19-8.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14327",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14327-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
}
],
"title": "python39-3.9.19-8.1 on GA media",
"tracking": {
"current_release_date": "2024-09-09T00:00:00Z",
"generator": {
"date": "2024-09-09T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14327-1",
"initial_release_date": "2024-09-09T00:00:00Z",
"revision_history": [
{
"date": "2024-09-09T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python39-3.9.19-8.1.aarch64",
"product": {
"name": "python39-3.9.19-8.1.aarch64",
"product_id": "python39-3.9.19-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.19-8.1.aarch64",
"product": {
"name": "python39-curses-3.9.19-8.1.aarch64",
"product_id": "python39-curses-3.9.19-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.19-8.1.aarch64",
"product": {
"name": "python39-dbm-3.9.19-8.1.aarch64",
"product_id": "python39-dbm-3.9.19-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.19-8.1.aarch64",
"product": {
"name": "python39-idle-3.9.19-8.1.aarch64",
"product_id": "python39-idle-3.9.19-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.19-8.1.aarch64",
"product": {
"name": "python39-tk-3.9.19-8.1.aarch64",
"product_id": "python39-tk-3.9.19-8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-3.9.19-8.1.ppc64le",
"product": {
"name": "python39-3.9.19-8.1.ppc64le",
"product_id": "python39-3.9.19-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.19-8.1.ppc64le",
"product": {
"name": "python39-curses-3.9.19-8.1.ppc64le",
"product_id": "python39-curses-3.9.19-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.19-8.1.ppc64le",
"product": {
"name": "python39-dbm-3.9.19-8.1.ppc64le",
"product_id": "python39-dbm-3.9.19-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.19-8.1.ppc64le",
"product": {
"name": "python39-idle-3.9.19-8.1.ppc64le",
"product_id": "python39-idle-3.9.19-8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.19-8.1.ppc64le",
"product": {
"name": "python39-tk-3.9.19-8.1.ppc64le",
"product_id": "python39-tk-3.9.19-8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-3.9.19-8.1.s390x",
"product": {
"name": "python39-3.9.19-8.1.s390x",
"product_id": "python39-3.9.19-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.19-8.1.s390x",
"product": {
"name": "python39-curses-3.9.19-8.1.s390x",
"product_id": "python39-curses-3.9.19-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.19-8.1.s390x",
"product": {
"name": "python39-dbm-3.9.19-8.1.s390x",
"product_id": "python39-dbm-3.9.19-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.19-8.1.s390x",
"product": {
"name": "python39-idle-3.9.19-8.1.s390x",
"product_id": "python39-idle-3.9.19-8.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.19-8.1.s390x",
"product": {
"name": "python39-tk-3.9.19-8.1.s390x",
"product_id": "python39-tk-3.9.19-8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python39-3.9.19-8.1.x86_64",
"product": {
"name": "python39-3.9.19-8.1.x86_64",
"product_id": "python39-3.9.19-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-curses-3.9.19-8.1.x86_64",
"product": {
"name": "python39-curses-3.9.19-8.1.x86_64",
"product_id": "python39-curses-3.9.19-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-dbm-3.9.19-8.1.x86_64",
"product": {
"name": "python39-dbm-3.9.19-8.1.x86_64",
"product_id": "python39-dbm-3.9.19-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-idle-3.9.19-8.1.x86_64",
"product": {
"name": "python39-idle-3.9.19-8.1.x86_64",
"product_id": "python39-idle-3.9.19-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-tk-3.9.19-8.1.x86_64",
"product": {
"name": "python39-tk-3.9.19-8.1.x86_64",
"product_id": "python39-tk-3.9.19-8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.19-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-3.9.19-8.1.aarch64"
},
"product_reference": "python39-3.9.19-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.19-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-3.9.19-8.1.ppc64le"
},
"product_reference": "python39-3.9.19-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.19-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-3.9.19-8.1.s390x"
},
"product_reference": "python39-3.9.19-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-3.9.19-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-3.9.19-8.1.x86_64"
},
"product_reference": "python39-3.9.19-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.19-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-curses-3.9.19-8.1.aarch64"
},
"product_reference": "python39-curses-3.9.19-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.19-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-curses-3.9.19-8.1.ppc64le"
},
"product_reference": "python39-curses-3.9.19-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.19-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-curses-3.9.19-8.1.s390x"
},
"product_reference": "python39-curses-3.9.19-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-curses-3.9.19-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-curses-3.9.19-8.1.x86_64"
},
"product_reference": "python39-curses-3.9.19-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.19-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.aarch64"
},
"product_reference": "python39-dbm-3.9.19-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.19-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.ppc64le"
},
"product_reference": "python39-dbm-3.9.19-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.19-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.s390x"
},
"product_reference": "python39-dbm-3.9.19-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-dbm-3.9.19-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.x86_64"
},
"product_reference": "python39-dbm-3.9.19-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.19-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-idle-3.9.19-8.1.aarch64"
},
"product_reference": "python39-idle-3.9.19-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.19-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-idle-3.9.19-8.1.ppc64le"
},
"product_reference": "python39-idle-3.9.19-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.19-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-idle-3.9.19-8.1.s390x"
},
"product_reference": "python39-idle-3.9.19-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-idle-3.9.19-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-idle-3.9.19-8.1.x86_64"
},
"product_reference": "python39-idle-3.9.19-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.19-8.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-tk-3.9.19-8.1.aarch64"
},
"product_reference": "python39-tk-3.9.19-8.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.19-8.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-tk-3.9.19-8.1.ppc64le"
},
"product_reference": "python39-tk-3.9.19-8.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.19-8.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-tk-3.9.19-8.1.s390x"
},
"product_reference": "python39-tk-3.9.19-8.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-tk-3.9.19-8.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-tk-3.9.19-8.1.x86_64"
},
"product_reference": "python39-tk-3.9.19-8.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python39-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python39-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python39-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-curses-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-dbm-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-idle-3.9.19-8.1.x86_64",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.aarch64",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.ppc64le",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.s390x",
"openSUSE Tumbleweed:python39-tk-3.9.19-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-6232"
}
]
}
OPENSUSE-SU-2025:15713-1
Vulnerability from csaf_opensuse - Published: 2025-11-07 00:00 - Updated: 2025-11-07 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python315-3.15.0~a1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python315-3.15.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15713",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15713-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10735 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-25236 page",
"url": "https://www.suse.com/security/cve/CVE-2022-25236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45061 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0286 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24329 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2650 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-27043 page",
"url": "https://www.suse.com/security/cve/CVE-2023-27043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-40217 page",
"url": "https://www.suse.com/security/cve/CVE-2023-40217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52425 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4032 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-0938 page",
"url": "https://www.suse.com/security/cve/CVE-2025-0938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4435 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4516 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6069 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8291 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8291/"
}
],
"title": "python315-3.15.0~a1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-07T00:00:00Z",
"generator": {
"date": "2025-11-07T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15713-1",
"initial_release_date": "2025-11-07T00:00:00Z",
"revision_history": [
{
"date": "2025-11-07T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python315-3.15.0~a1-1.1.aarch64",
"product": {
"name": "python315-3.15.0~a1-1.1.aarch64",
"product_id": "python315-3.15.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-curses-3.15.0~a1-1.1.aarch64",
"product": {
"name": "python315-curses-3.15.0~a1-1.1.aarch64",
"product_id": "python315-curses-3.15.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-dbm-3.15.0~a1-1.1.aarch64",
"product": {
"name": "python315-dbm-3.15.0~a1-1.1.aarch64",
"product_id": "python315-dbm-3.15.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-idle-3.15.0~a1-1.1.aarch64",
"product": {
"name": "python315-idle-3.15.0~a1-1.1.aarch64",
"product_id": "python315-idle-3.15.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-profiling-3.15.0~a1-1.1.aarch64",
"product": {
"name": "python315-profiling-3.15.0~a1-1.1.aarch64",
"product_id": "python315-profiling-3.15.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-tk-3.15.0~a1-1.1.aarch64",
"product": {
"name": "python315-tk-3.15.0~a1-1.1.aarch64",
"product_id": "python315-tk-3.15.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"product": {
"name": "python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"product_id": "python315-x86-64-v3-3.15.0~a1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python315-3.15.0~a1-1.1.ppc64le",
"product": {
"name": "python315-3.15.0~a1-1.1.ppc64le",
"product_id": "python315-3.15.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-curses-3.15.0~a1-1.1.ppc64le",
"product": {
"name": "python315-curses-3.15.0~a1-1.1.ppc64le",
"product_id": "python315-curses-3.15.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-dbm-3.15.0~a1-1.1.ppc64le",
"product": {
"name": "python315-dbm-3.15.0~a1-1.1.ppc64le",
"product_id": "python315-dbm-3.15.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-idle-3.15.0~a1-1.1.ppc64le",
"product": {
"name": "python315-idle-3.15.0~a1-1.1.ppc64le",
"product_id": "python315-idle-3.15.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-profiling-3.15.0~a1-1.1.ppc64le",
"product": {
"name": "python315-profiling-3.15.0~a1-1.1.ppc64le",
"product_id": "python315-profiling-3.15.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-tk-3.15.0~a1-1.1.ppc64le",
"product": {
"name": "python315-tk-3.15.0~a1-1.1.ppc64le",
"product_id": "python315-tk-3.15.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"product": {
"name": "python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"product_id": "python315-x86-64-v3-3.15.0~a1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python315-3.15.0~a1-1.1.s390x",
"product": {
"name": "python315-3.15.0~a1-1.1.s390x",
"product_id": "python315-3.15.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-curses-3.15.0~a1-1.1.s390x",
"product": {
"name": "python315-curses-3.15.0~a1-1.1.s390x",
"product_id": "python315-curses-3.15.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-dbm-3.15.0~a1-1.1.s390x",
"product": {
"name": "python315-dbm-3.15.0~a1-1.1.s390x",
"product_id": "python315-dbm-3.15.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-idle-3.15.0~a1-1.1.s390x",
"product": {
"name": "python315-idle-3.15.0~a1-1.1.s390x",
"product_id": "python315-idle-3.15.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-profiling-3.15.0~a1-1.1.s390x",
"product": {
"name": "python315-profiling-3.15.0~a1-1.1.s390x",
"product_id": "python315-profiling-3.15.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-tk-3.15.0~a1-1.1.s390x",
"product": {
"name": "python315-tk-3.15.0~a1-1.1.s390x",
"product_id": "python315-tk-3.15.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"product": {
"name": "python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"product_id": "python315-x86-64-v3-3.15.0~a1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python315-3.15.0~a1-1.1.x86_64",
"product": {
"name": "python315-3.15.0~a1-1.1.x86_64",
"product_id": "python315-3.15.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-curses-3.15.0~a1-1.1.x86_64",
"product": {
"name": "python315-curses-3.15.0~a1-1.1.x86_64",
"product_id": "python315-curses-3.15.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-dbm-3.15.0~a1-1.1.x86_64",
"product": {
"name": "python315-dbm-3.15.0~a1-1.1.x86_64",
"product_id": "python315-dbm-3.15.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-idle-3.15.0~a1-1.1.x86_64",
"product": {
"name": "python315-idle-3.15.0~a1-1.1.x86_64",
"product_id": "python315-idle-3.15.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-profiling-3.15.0~a1-1.1.x86_64",
"product": {
"name": "python315-profiling-3.15.0~a1-1.1.x86_64",
"product_id": "python315-profiling-3.15.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-tk-3.15.0~a1-1.1.x86_64",
"product": {
"name": "python315-tk-3.15.0~a1-1.1.x86_64",
"product_id": "python315-tk-3.15.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python315-x86-64-v3-3.15.0~a1-1.1.x86_64",
"product": {
"name": "python315-x86-64-v3-3.15.0~a1-1.1.x86_64",
"product_id": "python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-3.15.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64"
},
"product_reference": "python315-3.15.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-3.15.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le"
},
"product_reference": "python315-3.15.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-3.15.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x"
},
"product_reference": "python315-3.15.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-3.15.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64"
},
"product_reference": "python315-3.15.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-curses-3.15.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64"
},
"product_reference": "python315-curses-3.15.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-curses-3.15.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le"
},
"product_reference": "python315-curses-3.15.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-curses-3.15.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x"
},
"product_reference": "python315-curses-3.15.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-curses-3.15.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64"
},
"product_reference": "python315-curses-3.15.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-dbm-3.15.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64"
},
"product_reference": "python315-dbm-3.15.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-dbm-3.15.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le"
},
"product_reference": "python315-dbm-3.15.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-dbm-3.15.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x"
},
"product_reference": "python315-dbm-3.15.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-dbm-3.15.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64"
},
"product_reference": "python315-dbm-3.15.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-idle-3.15.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64"
},
"product_reference": "python315-idle-3.15.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-idle-3.15.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le"
},
"product_reference": "python315-idle-3.15.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-idle-3.15.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x"
},
"product_reference": "python315-idle-3.15.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-idle-3.15.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64"
},
"product_reference": "python315-idle-3.15.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-profiling-3.15.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64"
},
"product_reference": "python315-profiling-3.15.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-profiling-3.15.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le"
},
"product_reference": "python315-profiling-3.15.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-profiling-3.15.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x"
},
"product_reference": "python315-profiling-3.15.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-profiling-3.15.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64"
},
"product_reference": "python315-profiling-3.15.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-tk-3.15.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64"
},
"product_reference": "python315-tk-3.15.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-tk-3.15.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le"
},
"product_reference": "python315-tk-3.15.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-tk-3.15.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x"
},
"product_reference": "python315-tk-3.15.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-tk-3.15.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64"
},
"product_reference": "python315-tk-3.15.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-x86-64-v3-3.15.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64"
},
"product_reference": "python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-x86-64-v3-3.15.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le"
},
"product_reference": "python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-x86-64-v3-3.15.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x"
},
"product_reference": "python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python315-x86-64-v3-3.15.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
},
"product_reference": "python315-x86-64-v3-3.15.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-10735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10735"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10735",
"url": "https://www.suse.com/security/cve/CVE-2020-10735"
},
{
"category": "external",
"summary": "SUSE Bug 1203125 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1203125"
},
{
"category": "external",
"summary": "SUSE Bug 1204077 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204077"
},
{
"category": "external",
"summary": "SUSE Bug 1204096 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204096"
},
{
"category": "external",
"summary": "SUSE Bug 1204097 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204097"
},
{
"category": "external",
"summary": "SUSE Bug 1205075 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1205075"
},
{
"category": "external",
"summary": "SUSE Bug 1208131 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1208131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
},
{
"cve": "CVE-2022-25236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-25236"
}
],
"notes": [
{
"category": "general",
"text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-25236",
"url": "https://www.suse.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "SUSE Bug 1196025 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196025"
},
{
"category": "external",
"summary": "SUSE Bug 1196784 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196784"
},
{
"category": "external",
"summary": "SUSE Bug 1197217 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1197217"
},
{
"category": "external",
"summary": "SUSE Bug 1200038 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1200038"
},
{
"category": "external",
"summary": "SUSE Bug 1201735 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1201735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-42919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42919"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42919",
"url": "https://www.suse.com/security/cve/CVE-2022-42919"
},
{
"category": "external",
"summary": "SUSE Bug 1204886 for CVE-2022-42919",
"url": "https://bugzilla.suse.com/1204886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45061"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45061",
"url": "https://www.suse.com/security/cve/CVE-2022-45061"
},
{
"category": "external",
"summary": "SUSE Bug 1205244 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1205244"
},
{
"category": "external",
"summary": "SUSE Bug 1211488 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1211488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2023-0286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0286"
}
],
"notes": [
{
"category": "general",
"text": "There is a type confusion vulnerability relating to X.400 address processing\ninside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but\nthe public structure definition for GENERAL_NAME incorrectly specified the type\nof the x400Address field as ASN1_TYPE. This field is subsequently interpreted by\nthe OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an\nASN1_STRING.\n\nWhen CRL checking is enabled (i.e. the application sets the\nX509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass\narbitrary pointers to a memcmp call, enabling them to read memory contents or\nenact a denial of service. In most cases, the attack requires the attacker to\nprovide both the certificate chain and CRL, neither of which need to have a\nvalid signature. If the attacker only controls one of these inputs, the other\ninput must already contain an X.400 address as a CRL distribution point, which\nis uncommon. As such, this vulnerability is most likely to only affect\napplications which have implemented their own functionality for retrieving CRLs\nover a network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0286",
"url": "https://www.suse.com/security/cve/CVE-2023-0286"
},
{
"category": "external",
"summary": "SUSE Bug 1207533 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1207533"
},
{
"category": "external",
"summary": "SUSE Bug 1207569 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1207569"
},
{
"category": "external",
"summary": "SUSE Bug 1211136 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1211136"
},
{
"category": "external",
"summary": "SUSE Bug 1211503 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1211503"
},
{
"category": "external",
"summary": "SUSE Bug 1213146 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1213146"
},
{
"category": "external",
"summary": "SUSE Bug 1214269 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1214269"
},
{
"category": "external",
"summary": "SUSE Bug 1218477 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1218477"
},
{
"category": "external",
"summary": "SUSE Bug 1218967 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1218967"
},
{
"category": "external",
"summary": "SUSE Bug 1225677 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1225677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-24329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24329"
}
],
"notes": [
{
"category": "general",
"text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24329",
"url": "https://www.suse.com/security/cve/CVE-2023-24329"
},
{
"category": "external",
"summary": "SUSE Bug 1208471 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1208471"
},
{
"category": "external",
"summary": "SUSE Bug 1213553 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213553"
},
{
"category": "external",
"summary": "SUSE Bug 1213554 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213554"
},
{
"category": "external",
"summary": "SUSE Bug 1213839 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213839"
},
{
"category": "external",
"summary": "SUSE Bug 1225672 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1225672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-2650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2650"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or\ndata containing them may be very slow.\n\nImpact summary: Applications that use OBJ_obj2txt() directly, or use any of\nthe OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message\nsize limit may experience notable to very long delays when processing those\nmessages, which may lead to a Denial of Service.\n\nAn OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -\nmost of which have no size limit. OBJ_obj2txt() may be used to translate\nan ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL\ntype ASN1_OBJECT) to its canonical numeric text form, which are the\nsub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by\nperiods.\n\nWhen one of the sub-identifiers in the OBJECT IDENTIFIER is very large\n(these are sizes that are seen as absurdly large, taking up tens or hundreds\nof KiBs), the translation to a decimal number in text may take a very long\ntime. The time complexity is O(n^2) with \u0027n\u0027 being the size of the\nsub-identifiers in bytes (*).\n\nWith OpenSSL 3.0, support to fetch cryptographic algorithms using names /\nidentifiers in string form was introduced. This includes using OBJECT\nIDENTIFIERs in canonical numeric text form as identifiers for fetching\nalgorithms.\n\nSuch OBJECT IDENTIFIERs may be received through the ASN.1 structure\nAlgorithmIdentifier, which is commonly used in multiple protocols to specify\nwhat cryptographic algorithm should be used to sign or verify, encrypt or\ndecrypt, or digest passed data.\n\nApplications that call OBJ_obj2txt() directly with untrusted data are\naffected, with any version of OpenSSL. If the use is for the mere purpose\nof display, the severity is considered low.\n\nIn OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,\nCMS, CMP/CRMF or TS. It also impacts anything that processes X.509\ncertificates, including simple things like verifying its signature.\n\nThe impact on TLS is relatively low, because all versions of OpenSSL have a\n100KiB limit on the peer\u0027s certificate chain. Additionally, this only\nimpacts clients, or servers that have explicitly enabled client\nauthentication.\n\nIn OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,\nsuch as X.509 certificates. This is assumed to not happen in such a way\nthat it would cause a Denial of Service, so these versions are considered\nnot affected by this issue in such a way that it would be cause for concern,\nand the severity is therefore considered low.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2650",
"url": "https://www.suse.com/security/cve/CVE-2023-2650"
},
{
"category": "external",
"summary": "SUSE Bug 1211430 for CVE-2023-2650",
"url": "https://bugzilla.suse.com/1211430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-27043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-27043"
}
],
"notes": [
{
"category": "general",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-27043",
"url": "https://www.suse.com/security/cve/CVE-2023-27043"
},
{
"category": "external",
"summary": "SUSE Bug 1210638 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1210638"
},
{
"category": "external",
"summary": "SUSE Bug 1222537 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1222537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-40217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-40217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as \"not connected\" and won\u0027t initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-40217",
"url": "https://www.suse.com/security/cve/CVE-2023-40217"
},
{
"category": "external",
"summary": "SUSE Bug 1214692 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1214692"
},
{
"category": "external",
"summary": "SUSE Bug 1217524 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1217524"
},
{
"category": "external",
"summary": "SUSE Bug 1218319 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218319"
},
{
"category": "external",
"summary": "SUSE Bug 1218476 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218476"
},
{
"category": "external",
"summary": "SUSE Bug 1218965 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218965"
},
{
"category": "external",
"summary": "SUSE Bug 1219472 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1219472"
},
{
"category": "external",
"summary": "SUSE Bug 1219713 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1219713"
},
{
"category": "external",
"summary": "SUSE Bug 1221582 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1221582"
},
{
"category": "external",
"summary": "SUSE Bug 1224883 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1224883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-52425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52425"
}
],
"notes": [
{
"category": "general",
"text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52425",
"url": "https://www.suse.com/security/cve/CVE-2023-52425"
},
{
"category": "external",
"summary": "SUSE Bug 1219559 for CVE-2023-52425",
"url": "https://bugzilla.suse.com/1219559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4032"
}
],
"notes": [
{
"category": "general",
"text": "The \"ipaddress\" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \"globally reachable\" or \"private\". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn\u0027t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.\n\nCPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4032",
"url": "https://www.suse.com/security/cve/CVE-2024-4032"
},
{
"category": "external",
"summary": "SUSE Bug 1226448 for CVE-2024-4032",
"url": "https://bugzilla.suse.com/1226448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6923"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u0027t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6923",
"url": "https://www.suse.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "SUSE Bug 1228780 for CVE-2024-6923",
"url": "https://bugzilla.suse.com/1228780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
},
{
"cve": "CVE-2025-0938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-0938"
}
],
"notes": [
{
"category": "general",
"text": "The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn\u0027t valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-0938",
"url": "https://www.suse.com/security/cve/CVE-2025-0938"
},
{
"category": "external",
"summary": "SUSE Bug 1236705 for CVE-2025-0938",
"url": "https://bugzilla.suse.com/1236705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-0938"
},
{
"cve": "CVE-2025-4435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4435"
}
],
"notes": [
{
"category": "general",
"text": "When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4435",
"url": "https://www.suse.com/security/cve/CVE-2025-4435"
},
{
"category": "external",
"summary": "SUSE Bug 1244061 for CVE-2025-4435",
"url": "https://bugzilla.suse.com/1244061"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-4435"
},
{
"cve": "CVE-2025-4516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4516"
}
],
"notes": [
{
"category": "general",
"text": "There is an issue in CPython when using `bytes.decode(\"unicode_escape\", error=\"ignore|replace\")`. If you are not using the \"unicode_escape\" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4516",
"url": "https://www.suse.com/security/cve/CVE-2025-4516"
},
{
"category": "external",
"summary": "SUSE Bug 1243273 for CVE-2025-4516",
"url": "https://bugzilla.suse.com/1243273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-4516"
},
{
"cve": "CVE-2025-6069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6069"
}
],
"notes": [
{
"category": "general",
"text": "The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6069",
"url": "https://www.suse.com/security/cve/CVE-2025-6069"
},
{
"category": "external",
"summary": "SUSE Bug 1244705 for CVE-2025-6069",
"url": "https://bugzilla.suse.com/1244705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6069"
},
{
"cve": "CVE-2025-8194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8194"
}
],
"notes": [
{
"category": "general",
"text": "There is a defect in the CPython \"tarfile\" module affecting the \"TarFile\" extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. \n\nThis vulnerability can be mitigated by including the following patch after importing the \"tarfile\" module: https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8194",
"url": "https://www.suse.com/security/cve/CVE-2025-8194"
},
{
"category": "external",
"summary": "SUSE Bug 1247249 for CVE-2025-8194",
"url": "https://bugzilla.suse.com/1247249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-8194"
},
{
"cve": "CVE-2025-8291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8291"
}
],
"notes": [
{
"category": "general",
"text": "The \u0027zipfile\u0027 module would not check the validity of the ZIP64 End of\nCentral Directory (EOCD) Locator record offset value would not be used to\nlocate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be\nassumed to be the previous record in the ZIP archive. This could be abused\nto create ZIP archives that are handled differently by the \u0027zipfile\u0027 module\ncompared to other ZIP implementations.\n\n\nRemediation maintains this behavior, but checks that the offset specified\nin the ZIP64 EOCD Locator record matches the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8291",
"url": "https://www.suse.com/security/cve/CVE-2025-8291"
},
{
"category": "external",
"summary": "SUSE Bug 1251305 for CVE-2025-8291",
"url": "https://bugzilla.suse.com/1251305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-curses-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-dbm-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-idle-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-profiling-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-tk-3.15.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python315-x86-64-v3-3.15.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-8291"
}
]
}
OPENSUSE-SU-2024:14346-1
Vulnerability from csaf_opensuse - Published: 2024-09-18 00:00 - Updated: 2024-09-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python311-3.11.9-7.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python311-3.11.9-7.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14346",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14346-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:14346-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBWVORMJLTP5YM7GG2KA4LSPGF6N5YVF/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:14346-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBWVORMJLTP5YM7GG2KA4LSPGF6N5YVF/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
}
],
"title": "python311-3.11.9-7.1 on GA media",
"tracking": {
"current_release_date": "2024-09-18T00:00:00Z",
"generator": {
"date": "2024-09-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14346-1",
"initial_release_date": "2024-09-18T00:00:00Z",
"revision_history": [
{
"date": "2024-09-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-3.11.9-7.1.aarch64",
"product": {
"name": "python311-3.11.9-7.1.aarch64",
"product_id": "python311-3.11.9-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.10-1.1.aarch64",
"product": {
"name": "python311-32bit-3.11.10-1.1.aarch64",
"product_id": "python311-32bit-3.11.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.9-7.1.aarch64",
"product": {
"name": "python311-curses-3.11.9-7.1.aarch64",
"product_id": "python311-curses-3.11.9-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.9-7.1.aarch64",
"product": {
"name": "python311-dbm-3.11.9-7.1.aarch64",
"product_id": "python311-dbm-3.11.9-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.9-7.1.aarch64",
"product": {
"name": "python311-idle-3.11.9-7.1.aarch64",
"product_id": "python311-idle-3.11.9-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.9-7.1.aarch64",
"product": {
"name": "python311-tk-3.11.9-7.1.aarch64",
"product_id": "python311-tk-3.11.9-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-x86-64-v3-3.11.9-7.1.aarch64",
"product": {
"name": "python311-x86-64-v3-3.11.9-7.1.aarch64",
"product_id": "python311-x86-64-v3-3.11.9-7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-3.11.9-7.1.ppc64le",
"product": {
"name": "python311-3.11.9-7.1.ppc64le",
"product_id": "python311-3.11.9-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.10-1.1.ppc64le",
"product": {
"name": "python311-32bit-3.11.10-1.1.ppc64le",
"product_id": "python311-32bit-3.11.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.9-7.1.ppc64le",
"product": {
"name": "python311-curses-3.11.9-7.1.ppc64le",
"product_id": "python311-curses-3.11.9-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.9-7.1.ppc64le",
"product": {
"name": "python311-dbm-3.11.9-7.1.ppc64le",
"product_id": "python311-dbm-3.11.9-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.9-7.1.ppc64le",
"product": {
"name": "python311-idle-3.11.9-7.1.ppc64le",
"product_id": "python311-idle-3.11.9-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.9-7.1.ppc64le",
"product": {
"name": "python311-tk-3.11.9-7.1.ppc64le",
"product_id": "python311-tk-3.11.9-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-x86-64-v3-3.11.9-7.1.ppc64le",
"product": {
"name": "python311-x86-64-v3-3.11.9-7.1.ppc64le",
"product_id": "python311-x86-64-v3-3.11.9-7.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-3.11.9-7.1.s390x",
"product": {
"name": "python311-3.11.9-7.1.s390x",
"product_id": "python311-3.11.9-7.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.10-1.1.s390x",
"product": {
"name": "python311-32bit-3.11.10-1.1.s390x",
"product_id": "python311-32bit-3.11.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.9-7.1.s390x",
"product": {
"name": "python311-curses-3.11.9-7.1.s390x",
"product_id": "python311-curses-3.11.9-7.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.9-7.1.s390x",
"product": {
"name": "python311-dbm-3.11.9-7.1.s390x",
"product_id": "python311-dbm-3.11.9-7.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.9-7.1.s390x",
"product": {
"name": "python311-idle-3.11.9-7.1.s390x",
"product_id": "python311-idle-3.11.9-7.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.9-7.1.s390x",
"product": {
"name": "python311-tk-3.11.9-7.1.s390x",
"product_id": "python311-tk-3.11.9-7.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-x86-64-v3-3.11.9-7.1.s390x",
"product": {
"name": "python311-x86-64-v3-3.11.9-7.1.s390x",
"product_id": "python311-x86-64-v3-3.11.9-7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-3.11.9-7.1.x86_64",
"product": {
"name": "python311-3.11.9-7.1.x86_64",
"product_id": "python311-3.11.9-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-32bit-3.11.10-1.1.x86_64",
"product": {
"name": "python311-32bit-3.11.10-1.1.x86_64",
"product_id": "python311-32bit-3.11.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-curses-3.11.9-7.1.x86_64",
"product": {
"name": "python311-curses-3.11.9-7.1.x86_64",
"product_id": "python311-curses-3.11.9-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-dbm-3.11.9-7.1.x86_64",
"product": {
"name": "python311-dbm-3.11.9-7.1.x86_64",
"product_id": "python311-dbm-3.11.9-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-idle-3.11.9-7.1.x86_64",
"product": {
"name": "python311-idle-3.11.9-7.1.x86_64",
"product_id": "python311-idle-3.11.9-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-tk-3.11.9-7.1.x86_64",
"product": {
"name": "python311-tk-3.11.9-7.1.x86_64",
"product_id": "python311-tk-3.11.9-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-x86-64-v3-3.11.9-7.1.x86_64",
"product": {
"name": "python311-x86-64-v3-3.11.9-7.1.x86_64",
"product_id": "python311-x86-64-v3-3.11.9-7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.9-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64"
},
"product_reference": "python311-3.11.9-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.9-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le"
},
"product_reference": "python311-3.11.9-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.9-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-3.11.9-7.1.s390x"
},
"product_reference": "python311-3.11.9-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-3.11.9-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64"
},
"product_reference": "python311-3.11.9-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64"
},
"product_reference": "python311-32bit-3.11.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le"
},
"product_reference": "python311-32bit-3.11.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x"
},
"product_reference": "python311-32bit-3.11.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-32bit-3.11.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64"
},
"product_reference": "python311-32bit-3.11.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.9-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64"
},
"product_reference": "python311-curses-3.11.9-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.9-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le"
},
"product_reference": "python311-curses-3.11.9-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.9-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x"
},
"product_reference": "python311-curses-3.11.9-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-curses-3.11.9-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64"
},
"product_reference": "python311-curses-3.11.9-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.9-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64"
},
"product_reference": "python311-dbm-3.11.9-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.9-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le"
},
"product_reference": "python311-dbm-3.11.9-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.9-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x"
},
"product_reference": "python311-dbm-3.11.9-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-dbm-3.11.9-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64"
},
"product_reference": "python311-dbm-3.11.9-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.9-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64"
},
"product_reference": "python311-idle-3.11.9-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.9-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le"
},
"product_reference": "python311-idle-3.11.9-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.9-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x"
},
"product_reference": "python311-idle-3.11.9-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-idle-3.11.9-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64"
},
"product_reference": "python311-idle-3.11.9-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.9-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64"
},
"product_reference": "python311-tk-3.11.9-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.9-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le"
},
"product_reference": "python311-tk-3.11.9-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.9-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x"
},
"product_reference": "python311-tk-3.11.9-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-tk-3.11.9-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64"
},
"product_reference": "python311-tk-3.11.9-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-x86-64-v3-3.11.9-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64"
},
"product_reference": "python311-x86-64-v3-3.11.9-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-x86-64-v3-3.11.9-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le"
},
"product_reference": "python311-x86-64-v3-3.11.9-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-x86-64-v3-3.11.9-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x"
},
"product_reference": "python311-x86-64-v3-3.11.9-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-x86-64-v3-3.11.9-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
},
"product_reference": "python311-x86-64-v3-3.11.9-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.aarch64",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.ppc64le",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.s390x",
"openSUSE Tumbleweed:python311-32bit-3.11.10-1.1.x86_64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-curses-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-dbm-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-idle-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-tk-3.11.9-7.1.x86_64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.aarch64",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.ppc64le",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.s390x",
"openSUSE Tumbleweed:python311-x86-64-v3-3.11.9-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
}
]
}
OPENSUSE-SU-2024:14434-1
Vulnerability from csaf_opensuse - Published: 2024-10-28 00:00 - Updated: 2024-10-28 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python314-3.14.0~a1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python314-3.14.0~a1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14434",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14434-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3389 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4944 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0845 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-1150 page",
"url": "https://www.suse.com/security/cve/CVE-2012-1150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4238 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2667 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-4650 page",
"url": "https://www.suse.com/security/cve/CVE-2014-4650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20907 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5010 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9947 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10735 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15523 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15801 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8492 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23336 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23336/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3426 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-25236 page",
"url": "https://www.suse.com/security/cve/CVE-2022-25236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45061 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0286 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24329 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24329/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2650 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-27043 page",
"url": "https://www.suse.com/security/cve/CVE-2023-27043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-40217 page",
"url": "https://www.suse.com/security/cve/CVE-2023-40217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52425 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4032 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8088 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8088/"
}
],
"title": "python314-3.14.0~a1-1.1 on GA media",
"tracking": {
"current_release_date": "2024-10-28T00:00:00Z",
"generator": {
"date": "2024-10-28T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14434-1",
"initial_release_date": "2024-10-28T00:00:00Z",
"revision_history": [
{
"date": "2024-10-28T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python314-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-3.14.0~a1-1.1.aarch64",
"product_id": "python314-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-curses-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-curses-3.14.0~a1-1.1.aarch64",
"product_id": "python314-curses-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-dbm-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-dbm-3.14.0~a1-1.1.aarch64",
"product_id": "python314-dbm-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-idle-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-idle-3.14.0~a1-1.1.aarch64",
"product_id": "python314-idle-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-tk-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-tk-3.14.0~a1-1.1.aarch64",
"product_id": "python314-tk-3.14.0~a1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"product": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"product_id": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python314-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-curses-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-curses-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-curses-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-dbm-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-dbm-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-dbm-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-idle-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-idle-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-idle-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-tk-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-tk-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-tk-3.14.0~a1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"product": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"product_id": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python314-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-3.14.0~a1-1.1.s390x",
"product_id": "python314-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-curses-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-curses-3.14.0~a1-1.1.s390x",
"product_id": "python314-curses-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-dbm-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-dbm-3.14.0~a1-1.1.s390x",
"product_id": "python314-dbm-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-idle-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-idle-3.14.0~a1-1.1.s390x",
"product_id": "python314-idle-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-tk-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-tk-3.14.0~a1-1.1.s390x",
"product_id": "python314-tk-3.14.0~a1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"product": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"product_id": "python314-x86-64-v3-3.14.0~a1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python314-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-3.14.0~a1-1.1.x86_64",
"product_id": "python314-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-curses-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-curses-3.14.0~a1-1.1.x86_64",
"product_id": "python314-curses-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-dbm-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-dbm-3.14.0~a1-1.1.x86_64",
"product_id": "python314-dbm-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-idle-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-idle-3.14.0~a1-1.1.x86_64",
"product_id": "python314-idle-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-tk-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-tk-3.14.0~a1-1.1.x86_64",
"product_id": "python314-tk-3.14.0~a1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64",
"product": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64",
"product_id": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-curses-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-curses-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-curses-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-curses-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-curses-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-curses-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-curses-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-curses-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-dbm-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-dbm-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-dbm-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-dbm-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-dbm-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-dbm-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-dbm-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-dbm-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-idle-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-idle-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-idle-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-idle-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-idle-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-idle-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-idle-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-idle-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-tk-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-tk-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-tk-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-tk-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-tk-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-tk-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-tk-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-tk-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64"
},
"product_reference": "python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le"
},
"product_reference": "python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x"
},
"product_reference": "python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
},
"product_reference": "python314-x86-64-v3-3.14.0~a1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-3389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3389"
}
],
"notes": [
{
"category": "general",
"text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3389",
"url": "https://www.suse.com/security/cve/CVE-2011-3389"
},
{
"category": "external",
"summary": "SUSE Bug 716002 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/716002"
},
{
"category": "external",
"summary": "SUSE Bug 719047 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/719047"
},
{
"category": "external",
"summary": "SUSE Bug 725167 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/725167"
},
{
"category": "external",
"summary": "SUSE Bug 726096 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/726096"
},
{
"category": "external",
"summary": "SUSE Bug 739248 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739248"
},
{
"category": "external",
"summary": "SUSE Bug 739256 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/739256"
},
{
"category": "external",
"summary": "SUSE Bug 742306 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/742306"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 759666 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/759666"
},
{
"category": "external",
"summary": "SUSE Bug 763598 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/763598"
},
{
"category": "external",
"summary": "SUSE Bug 814655 for CVE-2011-3389",
"url": "https://bugzilla.suse.com/814655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-3389"
},
{
"cve": "CVE-2011-4944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4944"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4944",
"url": "https://www.suse.com/security/cve/CVE-2011-4944"
},
{
"category": "external",
"summary": "SUSE Bug 754447 for CVE-2011-4944",
"url": "https://bugzilla.suse.com/754447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-4944"
},
{
"cve": "CVE-2012-0845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0845"
}
],
"notes": [
{
"category": "general",
"text": "SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0845",
"url": "https://www.suse.com/security/cve/CVE-2012-0845"
},
{
"category": "external",
"summary": "SUSE Bug 747125 for CVE-2012-0845",
"url": "https://bugzilla.suse.com/747125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0845"
},
{
"cve": "CVE-2012-1150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-1150"
}
],
"notes": [
{
"category": "general",
"text": "Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-1150",
"url": "https://www.suse.com/security/cve/CVE-2012-1150"
},
{
"category": "external",
"summary": "SUSE Bug 751718 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/751718"
},
{
"category": "external",
"summary": "SUSE Bug 755383 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/755383"
},
{
"category": "external",
"summary": "SUSE Bug 826682 for CVE-2012-1150",
"url": "https://bugzilla.suse.com/826682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-1150"
},
{
"cve": "CVE-2013-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1752"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 \"Independently Fixable\" in the CVE Counting Decisions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1752",
"url": "https://www.suse.com/security/cve/CVE-2013-1752"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-1752",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1752"
},
{
"cve": "CVE-2013-4238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4238"
}
],
"notes": [
{
"category": "general",
"text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4238",
"url": "https://www.suse.com/security/cve/CVE-2013-4238"
},
{
"category": "external",
"summary": "SUSE Bug 834601 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/834601"
},
{
"category": "external",
"summary": "SUSE Bug 839107 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/839107"
},
{
"category": "external",
"summary": "SUSE Bug 882915 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/882915"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2013-4238",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4238"
},
{
"cve": "CVE-2014-2667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2667"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2667",
"url": "https://www.suse.com/security/cve/CVE-2014-2667"
},
{
"category": "external",
"summary": "SUSE Bug 871152 for CVE-2014-2667",
"url": "https://bugzilla.suse.com/871152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-2667"
},
{
"cve": "CVE-2014-4650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-4650"
}
],
"notes": [
{
"category": "general",
"text": "The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-4650",
"url": "https://www.suse.com/security/cve/CVE-2014-4650"
},
{
"category": "external",
"summary": "SUSE Bug 856835 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856835"
},
{
"category": "external",
"summary": "SUSE Bug 856836 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/856836"
},
{
"category": "external",
"summary": "SUSE Bug 863741 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/863741"
},
{
"category": "external",
"summary": "SUSE Bug 885882 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/885882"
},
{
"category": "external",
"summary": "SUSE Bug 898572 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/898572"
},
{
"category": "external",
"summary": "SUSE Bug 912739 for CVE-2014-4650",
"url": "https://bugzilla.suse.com/912739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-4650"
},
{
"cve": "CVE-2019-20907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20907"
}
],
"notes": [
{
"category": "general",
"text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20907",
"url": "https://www.suse.com/security/cve/CVE-2019-20907"
},
{
"category": "external",
"summary": "SUSE Bug 1174091 for CVE-2019-20907",
"url": "https://bugzilla.suse.com/1174091"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-5010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5010"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5010",
"url": "https://www.suse.com/security/cve/CVE-2019-5010"
},
{
"category": "external",
"summary": "SUSE Bug 1122191 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1122191"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2019-5010",
"url": "https://bugzilla.suse.com/1126909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-5010"
},
{
"cve": "CVE-2019-9947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9947"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9947",
"url": "https://www.suse.com/security/cve/CVE-2019-9947"
},
{
"category": "external",
"summary": "SUSE Bug 1130840 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1130840"
},
{
"category": "external",
"summary": "SUSE Bug 1136184 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1136184"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1155094"
},
{
"category": "external",
"summary": "SUSE Bug 1201559 for CVE-2019-9947",
"url": "https://bugzilla.suse.com/1201559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9947"
},
{
"cve": "CVE-2020-10735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10735"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10735",
"url": "https://www.suse.com/security/cve/CVE-2020-10735"
},
{
"category": "external",
"summary": "SUSE Bug 1203125 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1203125"
},
{
"category": "external",
"summary": "SUSE Bug 1204077 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204077"
},
{
"category": "external",
"summary": "SUSE Bug 1204096 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204096"
},
{
"category": "external",
"summary": "SUSE Bug 1204097 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1204097"
},
{
"category": "external",
"summary": "SUSE Bug 1205075 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1205075"
},
{
"category": "external",
"summary": "SUSE Bug 1208131 for CVE-2020-10735",
"url": "https://bugzilla.suse.com/1208131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-15523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15523"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15523",
"url": "https://www.suse.com/security/cve/CVE-2020-15523"
},
{
"category": "external",
"summary": "SUSE Bug 1173745 for CVE-2020-15523",
"url": "https://bugzilla.suse.com/1173745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15523"
},
{
"cve": "CVE-2020-15801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15801"
}
],
"notes": [
{
"category": "general",
"text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15801",
"url": "https://www.suse.com/security/cve/CVE-2020-15801"
},
{
"category": "external",
"summary": "SUSE Bug 1174241 for CVE-2020-15801",
"url": "https://bugzilla.suse.com/1174241"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15801"
},
{
"cve": "CVE-2020-8492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8492"
}
],
"notes": [
{
"category": "general",
"text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8492",
"url": "https://www.suse.com/security/cve/CVE-2020-8492"
},
{
"category": "external",
"summary": "SUSE Bug 1162367 for CVE-2020-8492",
"url": "https://bugzilla.suse.com/1162367"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2021-23336",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23336"
}
],
"notes": [
{
"category": "general",
"text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23336",
"url": "https://www.suse.com/security/cve/CVE-2021-23336"
},
{
"category": "external",
"summary": "SUSE Bug 1182179 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182179"
},
{
"category": "external",
"summary": "SUSE Bug 1182379 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182379"
},
{
"category": "external",
"summary": "SUSE Bug 1182433 for CVE-2021-23336",
"url": "https://bugzilla.suse.com/1182433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3177"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3177",
"url": "https://www.suse.com/security/cve/CVE-2021-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1181126 for CVE-2021-3177",
"url": "https://bugzilla.suse.com/1181126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-3426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3426"
}
],
"notes": [
{
"category": "general",
"text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3426",
"url": "https://www.suse.com/security/cve/CVE-2021-3426"
},
{
"category": "external",
"summary": "SUSE Bug 1183374 for CVE-2021-3426",
"url": "https://bugzilla.suse.com/1183374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3426"
},
{
"cve": "CVE-2022-25236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-25236"
}
],
"notes": [
{
"category": "general",
"text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-25236",
"url": "https://www.suse.com/security/cve/CVE-2022-25236"
},
{
"category": "external",
"summary": "SUSE Bug 1196025 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196025"
},
{
"category": "external",
"summary": "SUSE Bug 1196784 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1196784"
},
{
"category": "external",
"summary": "SUSE Bug 1197217 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1197217"
},
{
"category": "external",
"summary": "SUSE Bug 1200038 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1200038"
},
{
"category": "external",
"summary": "SUSE Bug 1201735 for CVE-2022-25236",
"url": "https://bugzilla.suse.com/1201735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-42919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42919"
}
],
"notes": [
{
"category": "general",
"text": "Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42919",
"url": "https://www.suse.com/security/cve/CVE-2022-42919"
},
{
"category": "external",
"summary": "SUSE Bug 1204886 for CVE-2022-42919",
"url": "https://bugzilla.suse.com/1204886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45061"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45061",
"url": "https://www.suse.com/security/cve/CVE-2022-45061"
},
{
"category": "external",
"summary": "SUSE Bug 1205244 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1205244"
},
{
"category": "external",
"summary": "SUSE Bug 1211488 for CVE-2022-45061",
"url": "https://bugzilla.suse.com/1211488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2023-0286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0286"
}
],
"notes": [
{
"category": "general",
"text": "There is a type confusion vulnerability relating to X.400 address processing\ninside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but\nthe public structure definition for GENERAL_NAME incorrectly specified the type\nof the x400Address field as ASN1_TYPE. This field is subsequently interpreted by\nthe OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an\nASN1_STRING.\n\nWhen CRL checking is enabled (i.e. the application sets the\nX509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass\narbitrary pointers to a memcmp call, enabling them to read memory contents or\nenact a denial of service. In most cases, the attack requires the attacker to\nprovide both the certificate chain and CRL, neither of which need to have a\nvalid signature. If the attacker only controls one of these inputs, the other\ninput must already contain an X.400 address as a CRL distribution point, which\nis uncommon. As such, this vulnerability is most likely to only affect\napplications which have implemented their own functionality for retrieving CRLs\nover a network.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0286",
"url": "https://www.suse.com/security/cve/CVE-2023-0286"
},
{
"category": "external",
"summary": "SUSE Bug 1207533 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1207533"
},
{
"category": "external",
"summary": "SUSE Bug 1207569 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1207569"
},
{
"category": "external",
"summary": "SUSE Bug 1211136 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1211136"
},
{
"category": "external",
"summary": "SUSE Bug 1211503 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1211503"
},
{
"category": "external",
"summary": "SUSE Bug 1213146 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1213146"
},
{
"category": "external",
"summary": "SUSE Bug 1214269 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1214269"
},
{
"category": "external",
"summary": "SUSE Bug 1218477 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1218477"
},
{
"category": "external",
"summary": "SUSE Bug 1218967 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1218967"
},
{
"category": "external",
"summary": "SUSE Bug 1225677 for CVE-2023-0286",
"url": "https://bugzilla.suse.com/1225677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-24329",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24329"
}
],
"notes": [
{
"category": "general",
"text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24329",
"url": "https://www.suse.com/security/cve/CVE-2023-24329"
},
{
"category": "external",
"summary": "SUSE Bug 1208471 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1208471"
},
{
"category": "external",
"summary": "SUSE Bug 1213553 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213553"
},
{
"category": "external",
"summary": "SUSE Bug 1213554 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213554"
},
{
"category": "external",
"summary": "SUSE Bug 1213839 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1213839"
},
{
"category": "external",
"summary": "SUSE Bug 1225672 for CVE-2023-24329",
"url": "https://bugzilla.suse.com/1225672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-2650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2650"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or\ndata containing them may be very slow.\n\nImpact summary: Applications that use OBJ_obj2txt() directly, or use any of\nthe OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message\nsize limit may experience notable to very long delays when processing those\nmessages, which may lead to a Denial of Service.\n\nAn OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -\nmost of which have no size limit. OBJ_obj2txt() may be used to translate\nan ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL\ntype ASN1_OBJECT) to its canonical numeric text form, which are the\nsub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by\nperiods.\n\nWhen one of the sub-identifiers in the OBJECT IDENTIFIER is very large\n(these are sizes that are seen as absurdly large, taking up tens or hundreds\nof KiBs), the translation to a decimal number in text may take a very long\ntime. The time complexity is O(n^2) with \u0027n\u0027 being the size of the\nsub-identifiers in bytes (*).\n\nWith OpenSSL 3.0, support to fetch cryptographic algorithms using names /\nidentifiers in string form was introduced. This includes using OBJECT\nIDENTIFIERs in canonical numeric text form as identifiers for fetching\nalgorithms.\n\nSuch OBJECT IDENTIFIERs may be received through the ASN.1 structure\nAlgorithmIdentifier, which is commonly used in multiple protocols to specify\nwhat cryptographic algorithm should be used to sign or verify, encrypt or\ndecrypt, or digest passed data.\n\nApplications that call OBJ_obj2txt() directly with untrusted data are\naffected, with any version of OpenSSL. If the use is for the mere purpose\nof display, the severity is considered low.\n\nIn OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,\nCMS, CMP/CRMF or TS. It also impacts anything that processes X.509\ncertificates, including simple things like verifying its signature.\n\nThe impact on TLS is relatively low, because all versions of OpenSSL have a\n100KiB limit on the peer\u0027s certificate chain. Additionally, this only\nimpacts clients, or servers that have explicitly enabled client\nauthentication.\n\nIn OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,\nsuch as X.509 certificates. This is assumed to not happen in such a way\nthat it would cause a Denial of Service, so these versions are considered\nnot affected by this issue in such a way that it would be cause for concern,\nand the severity is therefore considered low.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2650",
"url": "https://www.suse.com/security/cve/CVE-2023-2650"
},
{
"category": "external",
"summary": "SUSE Bug 1211430 for CVE-2023-2650",
"url": "https://bugzilla.suse.com/1211430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-27043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-27043"
}
],
"notes": [
{
"category": "general",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-27043",
"url": "https://www.suse.com/security/cve/CVE-2023-27043"
},
{
"category": "external",
"summary": "SUSE Bug 1210638 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1210638"
},
{
"category": "external",
"summary": "SUSE Bug 1222537 for CVE-2023-27043",
"url": "https://bugzilla.suse.com/1222537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-40217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-40217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as \"not connected\" and won\u0027t initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-40217",
"url": "https://www.suse.com/security/cve/CVE-2023-40217"
},
{
"category": "external",
"summary": "SUSE Bug 1214692 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1214692"
},
{
"category": "external",
"summary": "SUSE Bug 1217524 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1217524"
},
{
"category": "external",
"summary": "SUSE Bug 1218319 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218319"
},
{
"category": "external",
"summary": "SUSE Bug 1218476 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218476"
},
{
"category": "external",
"summary": "SUSE Bug 1218965 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1218965"
},
{
"category": "external",
"summary": "SUSE Bug 1219472 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1219472"
},
{
"category": "external",
"summary": "SUSE Bug 1219713 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1219713"
},
{
"category": "external",
"summary": "SUSE Bug 1221582 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1221582"
},
{
"category": "external",
"summary": "SUSE Bug 1224883 for CVE-2023-40217",
"url": "https://bugzilla.suse.com/1224883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-52425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52425"
}
],
"notes": [
{
"category": "general",
"text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52425",
"url": "https://www.suse.com/security/cve/CVE-2023-52425"
},
{
"category": "external",
"summary": "SUSE Bug 1219559 for CVE-2023-52425",
"url": "https://bugzilla.suse.com/1219559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4032"
}
],
"notes": [
{
"category": "general",
"text": "The \"ipaddress\" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \"globally reachable\" or \"private\". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn\u0027t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.\n\nCPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4032",
"url": "https://www.suse.com/security/cve/CVE-2024-4032"
},
{
"category": "external",
"summary": "SUSE Bug 1226448 for CVE-2024-4032",
"url": "https://bugzilla.suse.com/1226448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6923"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe \nemail module didn\u0027t properly quote newlines for email headers when \nserializing an email message allowing for header injection when an email\n is serialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6923",
"url": "https://www.suse.com/security/cve/CVE-2024-6923"
},
{
"category": "external",
"summary": "SUSE Bug 1228780 for CVE-2024-6923",
"url": "https://bugzilla.suse.com/1228780"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8088"
}
],
"notes": [
{
"category": "general",
"text": "There is a HIGH severity vulnerability affecting the CPython \"zipfile\"\nmodule affecting \"zipfile.Path\". Note that the more common API \"zipfile.ZipFile\" class is unaffected.\n\n\n\n\n\nWhen iterating over names of entries in a zip archive (for example, methods\nof \"zipfile.Path\" like \"namelist()\", \"iterdir()\", etc)\nthe process can be put into an infinite loop with a maliciously crafted\nzip archive. This defect applies when reading only metadata or extracting\nthe contents of the zip archive. Programs that are not handling\nuser-controlled zip archives are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8088",
"url": "https://www.suse.com/security/cve/CVE-2024-8088"
},
{
"category": "external",
"summary": "SUSE Bug 1229704 for CVE-2024-8088",
"url": "https://bugzilla.suse.com/1229704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1.x86_64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.aarch64",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.ppc64le",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.s390x",
"openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-10-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-8088"
}
]
}
OPENSUSE-SU-2024:14370-1
Vulnerability from csaf_opensuse - Published: 2024-09-26 00:00 - Updated: 2024-09-26 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python312-3.12.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python312-3.12.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14370",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14370-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:14370-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKDHGTJKHTETAZ6BAHXXRCINJKQVWXGN/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:14370-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKDHGTJKHTETAZ6BAHXXRCINJKQVWXGN/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
}
],
"title": "python312-3.12.6-1.1 on GA media",
"tracking": {
"current_release_date": "2024-09-26T00:00:00Z",
"generator": {
"date": "2024-09-26T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14370-1",
"initial_release_date": "2024-09-26T00:00:00Z",
"revision_history": [
{
"date": "2024-09-26T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python312-3.12.6-1.1.aarch64",
"product": {
"name": "python312-3.12.6-1.1.aarch64",
"product_id": "python312-3.12.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-32bit-3.12.6-1.1.aarch64",
"product": {
"name": "python312-32bit-3.12.6-1.1.aarch64",
"product_id": "python312-32bit-3.12.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-1.1.aarch64",
"product": {
"name": "python312-curses-3.12.6-1.1.aarch64",
"product_id": "python312-curses-3.12.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-1.1.aarch64",
"product": {
"name": "python312-dbm-3.12.6-1.1.aarch64",
"product_id": "python312-dbm-3.12.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-1.1.aarch64",
"product": {
"name": "python312-idle-3.12.6-1.1.aarch64",
"product_id": "python312-idle-3.12.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-1.1.aarch64",
"product": {
"name": "python312-tk-3.12.6-1.1.aarch64",
"product_id": "python312-tk-3.12.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-x86-64-v3-3.12.6-1.1.aarch64",
"product": {
"name": "python312-x86-64-v3-3.12.6-1.1.aarch64",
"product_id": "python312-x86-64-v3-3.12.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python312-3.12.6-1.1.ppc64le",
"product": {
"name": "python312-3.12.6-1.1.ppc64le",
"product_id": "python312-3.12.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-32bit-3.12.6-1.1.ppc64le",
"product": {
"name": "python312-32bit-3.12.6-1.1.ppc64le",
"product_id": "python312-32bit-3.12.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-1.1.ppc64le",
"product": {
"name": "python312-curses-3.12.6-1.1.ppc64le",
"product_id": "python312-curses-3.12.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-1.1.ppc64le",
"product": {
"name": "python312-dbm-3.12.6-1.1.ppc64le",
"product_id": "python312-dbm-3.12.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-1.1.ppc64le",
"product": {
"name": "python312-idle-3.12.6-1.1.ppc64le",
"product_id": "python312-idle-3.12.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-1.1.ppc64le",
"product": {
"name": "python312-tk-3.12.6-1.1.ppc64le",
"product_id": "python312-tk-3.12.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-x86-64-v3-3.12.6-1.1.ppc64le",
"product": {
"name": "python312-x86-64-v3-3.12.6-1.1.ppc64le",
"product_id": "python312-x86-64-v3-3.12.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python312-3.12.6-1.1.s390x",
"product": {
"name": "python312-3.12.6-1.1.s390x",
"product_id": "python312-3.12.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-32bit-3.12.6-1.1.s390x",
"product": {
"name": "python312-32bit-3.12.6-1.1.s390x",
"product_id": "python312-32bit-3.12.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-1.1.s390x",
"product": {
"name": "python312-curses-3.12.6-1.1.s390x",
"product_id": "python312-curses-3.12.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-1.1.s390x",
"product": {
"name": "python312-dbm-3.12.6-1.1.s390x",
"product_id": "python312-dbm-3.12.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-1.1.s390x",
"product": {
"name": "python312-idle-3.12.6-1.1.s390x",
"product_id": "python312-idle-3.12.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-1.1.s390x",
"product": {
"name": "python312-tk-3.12.6-1.1.s390x",
"product_id": "python312-tk-3.12.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-x86-64-v3-3.12.6-1.1.s390x",
"product": {
"name": "python312-x86-64-v3-3.12.6-1.1.s390x",
"product_id": "python312-x86-64-v3-3.12.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python312-3.12.6-1.1.x86_64",
"product": {
"name": "python312-3.12.6-1.1.x86_64",
"product_id": "python312-3.12.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-32bit-3.12.6-1.1.x86_64",
"product": {
"name": "python312-32bit-3.12.6-1.1.x86_64",
"product_id": "python312-32bit-3.12.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-curses-3.12.6-1.1.x86_64",
"product": {
"name": "python312-curses-3.12.6-1.1.x86_64",
"product_id": "python312-curses-3.12.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-dbm-3.12.6-1.1.x86_64",
"product": {
"name": "python312-dbm-3.12.6-1.1.x86_64",
"product_id": "python312-dbm-3.12.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-idle-3.12.6-1.1.x86_64",
"product": {
"name": "python312-idle-3.12.6-1.1.x86_64",
"product_id": "python312-idle-3.12.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-tk-3.12.6-1.1.x86_64",
"product": {
"name": "python312-tk-3.12.6-1.1.x86_64",
"product_id": "python312-tk-3.12.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-x86-64-v3-3.12.6-1.1.x86_64",
"product": {
"name": "python312-x86-64-v3-3.12.6-1.1.x86_64",
"product_id": "python312-x86-64-v3-3.12.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-3.12.6-1.1.aarch64"
},
"product_reference": "python312-3.12.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-3.12.6-1.1.ppc64le"
},
"product_reference": "python312-3.12.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-3.12.6-1.1.s390x"
},
"product_reference": "python312-3.12.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-3.12.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-3.12.6-1.1.x86_64"
},
"product_reference": "python312-3.12.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-32bit-3.12.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.aarch64"
},
"product_reference": "python312-32bit-3.12.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-32bit-3.12.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.ppc64le"
},
"product_reference": "python312-32bit-3.12.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-32bit-3.12.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.s390x"
},
"product_reference": "python312-32bit-3.12.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-32bit-3.12.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.x86_64"
},
"product_reference": "python312-32bit-3.12.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-curses-3.12.6-1.1.aarch64"
},
"product_reference": "python312-curses-3.12.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-curses-3.12.6-1.1.ppc64le"
},
"product_reference": "python312-curses-3.12.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-curses-3.12.6-1.1.s390x"
},
"product_reference": "python312-curses-3.12.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-curses-3.12.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-curses-3.12.6-1.1.x86_64"
},
"product_reference": "python312-curses-3.12.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.aarch64"
},
"product_reference": "python312-dbm-3.12.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.ppc64le"
},
"product_reference": "python312-dbm-3.12.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.s390x"
},
"product_reference": "python312-dbm-3.12.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-dbm-3.12.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.x86_64"
},
"product_reference": "python312-dbm-3.12.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-idle-3.12.6-1.1.aarch64"
},
"product_reference": "python312-idle-3.12.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-idle-3.12.6-1.1.ppc64le"
},
"product_reference": "python312-idle-3.12.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-idle-3.12.6-1.1.s390x"
},
"product_reference": "python312-idle-3.12.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-idle-3.12.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-idle-3.12.6-1.1.x86_64"
},
"product_reference": "python312-idle-3.12.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-tk-3.12.6-1.1.aarch64"
},
"product_reference": "python312-tk-3.12.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-tk-3.12.6-1.1.ppc64le"
},
"product_reference": "python312-tk-3.12.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-tk-3.12.6-1.1.s390x"
},
"product_reference": "python312-tk-3.12.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-tk-3.12.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-tk-3.12.6-1.1.x86_64"
},
"product_reference": "python312-tk-3.12.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-x86-64-v3-3.12.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.aarch64"
},
"product_reference": "python312-x86-64-v3-3.12.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-x86-64-v3-3.12.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.ppc64le"
},
"product_reference": "python312-x86-64-v3-3.12.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-x86-64-v3-3.12.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.s390x"
},
"product_reference": "python312-x86-64-v3-3.12.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-x86-64-v3-3.12.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.x86_64"
},
"product_reference": "python312-x86-64-v3-3.12.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-26T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python312-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python312-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python312-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-32bit-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-curses-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-dbm-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-idle-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-tk-3.12.6-1.1.x86_64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.aarch64",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.ppc64le",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.s390x",
"openSUSE Tumbleweed:python312-x86-64-v3-3.12.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-26T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
}
]
}
OPENSUSE-SU-2024:14340-1
Vulnerability from csaf_opensuse - Published: 2024-09-17 00:00 - Updated: 2024-09-17 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python38-3.8.20-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python38-3.8.20-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14340",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14340-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:14340-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB3HULWLZQ24PRVM3P2LCSJ3IJUISSTW/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:14340-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB3HULWLZQ24PRVM3P2LCSJ3IJUISSTW/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
}
],
"title": "python38-3.8.20-1.1 on GA media",
"tracking": {
"current_release_date": "2024-09-17T00:00:00Z",
"generator": {
"date": "2024-09-17T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14340-1",
"initial_release_date": "2024-09-17T00:00:00Z",
"revision_history": [
{
"date": "2024-09-17T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python38-3.8.20-1.1.aarch64",
"product": {
"name": "python38-3.8.20-1.1.aarch64",
"product_id": "python38-3.8.20-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python38-curses-3.8.20-1.1.aarch64",
"product": {
"name": "python38-curses-3.8.20-1.1.aarch64",
"product_id": "python38-curses-3.8.20-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python38-dbm-3.8.20-1.1.aarch64",
"product": {
"name": "python38-dbm-3.8.20-1.1.aarch64",
"product_id": "python38-dbm-3.8.20-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python38-idle-3.8.20-1.1.aarch64",
"product": {
"name": "python38-idle-3.8.20-1.1.aarch64",
"product_id": "python38-idle-3.8.20-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python38-tk-3.8.20-1.1.aarch64",
"product": {
"name": "python38-tk-3.8.20-1.1.aarch64",
"product_id": "python38-tk-3.8.20-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python38-3.8.20-1.1.ppc64le",
"product": {
"name": "python38-3.8.20-1.1.ppc64le",
"product_id": "python38-3.8.20-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-curses-3.8.20-1.1.ppc64le",
"product": {
"name": "python38-curses-3.8.20-1.1.ppc64le",
"product_id": "python38-curses-3.8.20-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-dbm-3.8.20-1.1.ppc64le",
"product": {
"name": "python38-dbm-3.8.20-1.1.ppc64le",
"product_id": "python38-dbm-3.8.20-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-idle-3.8.20-1.1.ppc64le",
"product": {
"name": "python38-idle-3.8.20-1.1.ppc64le",
"product_id": "python38-idle-3.8.20-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-tk-3.8.20-1.1.ppc64le",
"product": {
"name": "python38-tk-3.8.20-1.1.ppc64le",
"product_id": "python38-tk-3.8.20-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python38-3.8.20-1.1.s390x",
"product": {
"name": "python38-3.8.20-1.1.s390x",
"product_id": "python38-3.8.20-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python38-curses-3.8.20-1.1.s390x",
"product": {
"name": "python38-curses-3.8.20-1.1.s390x",
"product_id": "python38-curses-3.8.20-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python38-dbm-3.8.20-1.1.s390x",
"product": {
"name": "python38-dbm-3.8.20-1.1.s390x",
"product_id": "python38-dbm-3.8.20-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python38-idle-3.8.20-1.1.s390x",
"product": {
"name": "python38-idle-3.8.20-1.1.s390x",
"product_id": "python38-idle-3.8.20-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python38-tk-3.8.20-1.1.s390x",
"product": {
"name": "python38-tk-3.8.20-1.1.s390x",
"product_id": "python38-tk-3.8.20-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python38-3.8.20-1.1.x86_64",
"product": {
"name": "python38-3.8.20-1.1.x86_64",
"product_id": "python38-3.8.20-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python38-curses-3.8.20-1.1.x86_64",
"product": {
"name": "python38-curses-3.8.20-1.1.x86_64",
"product_id": "python38-curses-3.8.20-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python38-dbm-3.8.20-1.1.x86_64",
"product": {
"name": "python38-dbm-3.8.20-1.1.x86_64",
"product_id": "python38-dbm-3.8.20-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python38-idle-3.8.20-1.1.x86_64",
"product": {
"name": "python38-idle-3.8.20-1.1.x86_64",
"product_id": "python38-idle-3.8.20-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python38-tk-3.8.20-1.1.x86_64",
"product": {
"name": "python38-tk-3.8.20-1.1.x86_64",
"product_id": "python38-tk-3.8.20-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-3.8.20-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-3.8.20-1.1.aarch64"
},
"product_reference": "python38-3.8.20-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-3.8.20-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-3.8.20-1.1.ppc64le"
},
"product_reference": "python38-3.8.20-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-3.8.20-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-3.8.20-1.1.s390x"
},
"product_reference": "python38-3.8.20-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-3.8.20-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-3.8.20-1.1.x86_64"
},
"product_reference": "python38-3.8.20-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-curses-3.8.20-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-curses-3.8.20-1.1.aarch64"
},
"product_reference": "python38-curses-3.8.20-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-curses-3.8.20-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-curses-3.8.20-1.1.ppc64le"
},
"product_reference": "python38-curses-3.8.20-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-curses-3.8.20-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-curses-3.8.20-1.1.s390x"
},
"product_reference": "python38-curses-3.8.20-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-curses-3.8.20-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-curses-3.8.20-1.1.x86_64"
},
"product_reference": "python38-curses-3.8.20-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dbm-3.8.20-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.aarch64"
},
"product_reference": "python38-dbm-3.8.20-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dbm-3.8.20-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.ppc64le"
},
"product_reference": "python38-dbm-3.8.20-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dbm-3.8.20-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.s390x"
},
"product_reference": "python38-dbm-3.8.20-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-dbm-3.8.20-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.x86_64"
},
"product_reference": "python38-dbm-3.8.20-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-idle-3.8.20-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-idle-3.8.20-1.1.aarch64"
},
"product_reference": "python38-idle-3.8.20-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-idle-3.8.20-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-idle-3.8.20-1.1.ppc64le"
},
"product_reference": "python38-idle-3.8.20-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-idle-3.8.20-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-idle-3.8.20-1.1.s390x"
},
"product_reference": "python38-idle-3.8.20-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-idle-3.8.20-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-idle-3.8.20-1.1.x86_64"
},
"product_reference": "python38-idle-3.8.20-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-tk-3.8.20-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-tk-3.8.20-1.1.aarch64"
},
"product_reference": "python38-tk-3.8.20-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-tk-3.8.20-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-tk-3.8.20-1.1.ppc64le"
},
"product_reference": "python38-tk-3.8.20-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-tk-3.8.20-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-tk-3.8.20-1.1.s390x"
},
"product_reference": "python38-tk-3.8.20-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-tk-3.8.20-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-tk-3.8.20-1.1.x86_64"
},
"product_reference": "python38-tk-3.8.20-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python38-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python38-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python38-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-curses-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-dbm-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-idle-3.8.20-1.1.x86_64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.aarch64",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.ppc64le",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.s390x",
"openSUSE Tumbleweed:python38-tk-3.8.20-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-6232"
}
]
}
OPENSUSE-SU-2024:14326-1
Vulnerability from csaf_opensuse - Published: 2024-09-09 00:00 - Updated: 2024-09-09 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python313-3.13.0~rc2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python313-3.13.0~rc2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14326",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14326-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4032 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
}
],
"title": "python313-3.13.0~rc2-1.1 on GA media",
"tracking": {
"current_release_date": "2024-09-09T00:00:00Z",
"generator": {
"date": "2024-09-09T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14326-1",
"initial_release_date": "2024-09-09T00:00:00Z",
"revision_history": [
{
"date": "2024-09-09T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python313-3.13.0~rc2-1.1.aarch64",
"product": {
"name": "python313-3.13.0~rc2-1.1.aarch64",
"product_id": "python313-3.13.0~rc2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-curses-3.13.0~rc2-1.1.aarch64",
"product": {
"name": "python313-curses-3.13.0~rc2-1.1.aarch64",
"product_id": "python313-curses-3.13.0~rc2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-dbm-3.13.0~rc2-1.1.aarch64",
"product": {
"name": "python313-dbm-3.13.0~rc2-1.1.aarch64",
"product_id": "python313-dbm-3.13.0~rc2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-idle-3.13.0~rc2-1.1.aarch64",
"product": {
"name": "python313-idle-3.13.0~rc2-1.1.aarch64",
"product_id": "python313-idle-3.13.0~rc2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-tk-3.13.0~rc2-1.1.aarch64",
"product": {
"name": "python313-tk-3.13.0~rc2-1.1.aarch64",
"product_id": "python313-tk-3.13.0~rc2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"product": {
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"product_id": "python313-x86-64-v3-3.13.0~rc2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python313-3.13.0~rc2-1.1.ppc64le",
"product": {
"name": "python313-3.13.0~rc2-1.1.ppc64le",
"product_id": "python313-3.13.0~rc2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-curses-3.13.0~rc2-1.1.ppc64le",
"product": {
"name": "python313-curses-3.13.0~rc2-1.1.ppc64le",
"product_id": "python313-curses-3.13.0~rc2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-dbm-3.13.0~rc2-1.1.ppc64le",
"product": {
"name": "python313-dbm-3.13.0~rc2-1.1.ppc64le",
"product_id": "python313-dbm-3.13.0~rc2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-idle-3.13.0~rc2-1.1.ppc64le",
"product": {
"name": "python313-idle-3.13.0~rc2-1.1.ppc64le",
"product_id": "python313-idle-3.13.0~rc2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-tk-3.13.0~rc2-1.1.ppc64le",
"product": {
"name": "python313-tk-3.13.0~rc2-1.1.ppc64le",
"product_id": "python313-tk-3.13.0~rc2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"product": {
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"product_id": "python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python313-3.13.0~rc2-1.1.s390x",
"product": {
"name": "python313-3.13.0~rc2-1.1.s390x",
"product_id": "python313-3.13.0~rc2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-curses-3.13.0~rc2-1.1.s390x",
"product": {
"name": "python313-curses-3.13.0~rc2-1.1.s390x",
"product_id": "python313-curses-3.13.0~rc2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-dbm-3.13.0~rc2-1.1.s390x",
"product": {
"name": "python313-dbm-3.13.0~rc2-1.1.s390x",
"product_id": "python313-dbm-3.13.0~rc2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-idle-3.13.0~rc2-1.1.s390x",
"product": {
"name": "python313-idle-3.13.0~rc2-1.1.s390x",
"product_id": "python313-idle-3.13.0~rc2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-tk-3.13.0~rc2-1.1.s390x",
"product": {
"name": "python313-tk-3.13.0~rc2-1.1.s390x",
"product_id": "python313-tk-3.13.0~rc2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"product": {
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"product_id": "python313-x86-64-v3-3.13.0~rc2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python313-3.13.0~rc2-1.1.x86_64",
"product": {
"name": "python313-3.13.0~rc2-1.1.x86_64",
"product_id": "python313-3.13.0~rc2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-curses-3.13.0~rc2-1.1.x86_64",
"product": {
"name": "python313-curses-3.13.0~rc2-1.1.x86_64",
"product_id": "python313-curses-3.13.0~rc2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-dbm-3.13.0~rc2-1.1.x86_64",
"product": {
"name": "python313-dbm-3.13.0~rc2-1.1.x86_64",
"product_id": "python313-dbm-3.13.0~rc2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-idle-3.13.0~rc2-1.1.x86_64",
"product": {
"name": "python313-idle-3.13.0~rc2-1.1.x86_64",
"product_id": "python313-idle-3.13.0~rc2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-tk-3.13.0~rc2-1.1.x86_64",
"product": {
"name": "python313-tk-3.13.0~rc2-1.1.x86_64",
"product_id": "python313-tk-3.13.0~rc2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.x86_64",
"product": {
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.x86_64",
"product_id": "python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-3.13.0~rc2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64"
},
"product_reference": "python313-3.13.0~rc2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-3.13.0~rc2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le"
},
"product_reference": "python313-3.13.0~rc2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-3.13.0~rc2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x"
},
"product_reference": "python313-3.13.0~rc2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-3.13.0~rc2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64"
},
"product_reference": "python313-3.13.0~rc2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-curses-3.13.0~rc2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64"
},
"product_reference": "python313-curses-3.13.0~rc2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-curses-3.13.0~rc2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le"
},
"product_reference": "python313-curses-3.13.0~rc2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-curses-3.13.0~rc2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x"
},
"product_reference": "python313-curses-3.13.0~rc2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-curses-3.13.0~rc2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64"
},
"product_reference": "python313-curses-3.13.0~rc2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-dbm-3.13.0~rc2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64"
},
"product_reference": "python313-dbm-3.13.0~rc2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-dbm-3.13.0~rc2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le"
},
"product_reference": "python313-dbm-3.13.0~rc2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-dbm-3.13.0~rc2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x"
},
"product_reference": "python313-dbm-3.13.0~rc2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-dbm-3.13.0~rc2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64"
},
"product_reference": "python313-dbm-3.13.0~rc2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-idle-3.13.0~rc2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64"
},
"product_reference": "python313-idle-3.13.0~rc2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-idle-3.13.0~rc2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le"
},
"product_reference": "python313-idle-3.13.0~rc2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-idle-3.13.0~rc2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x"
},
"product_reference": "python313-idle-3.13.0~rc2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-idle-3.13.0~rc2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64"
},
"product_reference": "python313-idle-3.13.0~rc2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-tk-3.13.0~rc2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64"
},
"product_reference": "python313-tk-3.13.0~rc2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-tk-3.13.0~rc2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le"
},
"product_reference": "python313-tk-3.13.0~rc2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-tk-3.13.0~rc2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x"
},
"product_reference": "python313-tk-3.13.0~rc2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-tk-3.13.0~rc2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64"
},
"product_reference": "python313-tk-3.13.0~rc2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64"
},
"product_reference": "python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le"
},
"product_reference": "python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x"
},
"product_reference": "python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-x86-64-v3-3.13.0~rc2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
},
"product_reference": "python313-x86-64-v3-3.13.0~rc2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4032"
}
],
"notes": [
{
"category": "general",
"text": "The \"ipaddress\" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as \"globally reachable\" or \"private\". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn\u0027t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.\n\nCPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4032",
"url": "https://www.suse.com/security/cve/CVE-2024-4032"
},
{
"category": "external",
"summary": "SUSE Bug 1226448 for CVE-2024-4032",
"url": "https://bugzilla.suse.com/1226448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-curses-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-dbm-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1.x86_64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.aarch64",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.ppc64le",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.s390x",
"openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-09T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
}
]
}
OPENSUSE-SU-2024:14345-1
Vulnerability from csaf_opensuse - Published: 2024-09-18 00:00 - Updated: 2024-09-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-3.10.15-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-3.10.15-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14345",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14345-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:14345-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XGNLIXONZEJPUCB2A4GVFSDMNJ37VXYU/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:14345-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XGNLIXONZEJPUCB2A4GVFSDMNJ37VXYU/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4030 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6232 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-7592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-7592/"
}
],
"title": "python310-3.10.15-1.1 on GA media",
"tracking": {
"current_release_date": "2024-09-18T00:00:00Z",
"generator": {
"date": "2024-09-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14345-1",
"initial_release_date": "2024-09-18T00:00:00Z",
"revision_history": [
{
"date": "2024-09-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.15-1.1.aarch64",
"product": {
"name": "python310-3.10.15-1.1.aarch64",
"product_id": "python310-3.10.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.15-1.1.aarch64",
"product": {
"name": "python310-32bit-3.10.15-1.1.aarch64",
"product_id": "python310-32bit-3.10.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-1.1.aarch64",
"product": {
"name": "python310-curses-3.10.15-1.1.aarch64",
"product_id": "python310-curses-3.10.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-1.1.aarch64",
"product": {
"name": "python310-dbm-3.10.15-1.1.aarch64",
"product_id": "python310-dbm-3.10.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-1.1.aarch64",
"product": {
"name": "python310-idle-3.10.15-1.1.aarch64",
"product_id": "python310-idle-3.10.15-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-1.1.aarch64",
"product": {
"name": "python310-tk-3.10.15-1.1.aarch64",
"product_id": "python310-tk-3.10.15-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.15-1.1.ppc64le",
"product": {
"name": "python310-3.10.15-1.1.ppc64le",
"product_id": "python310-3.10.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.15-1.1.ppc64le",
"product": {
"name": "python310-32bit-3.10.15-1.1.ppc64le",
"product_id": "python310-32bit-3.10.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-1.1.ppc64le",
"product": {
"name": "python310-curses-3.10.15-1.1.ppc64le",
"product_id": "python310-curses-3.10.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-1.1.ppc64le",
"product": {
"name": "python310-dbm-3.10.15-1.1.ppc64le",
"product_id": "python310-dbm-3.10.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-1.1.ppc64le",
"product": {
"name": "python310-idle-3.10.15-1.1.ppc64le",
"product_id": "python310-idle-3.10.15-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-1.1.ppc64le",
"product": {
"name": "python310-tk-3.10.15-1.1.ppc64le",
"product_id": "python310-tk-3.10.15-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.15-1.1.s390x",
"product": {
"name": "python310-3.10.15-1.1.s390x",
"product_id": "python310-3.10.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.15-1.1.s390x",
"product": {
"name": "python310-32bit-3.10.15-1.1.s390x",
"product_id": "python310-32bit-3.10.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-1.1.s390x",
"product": {
"name": "python310-curses-3.10.15-1.1.s390x",
"product_id": "python310-curses-3.10.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-1.1.s390x",
"product": {
"name": "python310-dbm-3.10.15-1.1.s390x",
"product_id": "python310-dbm-3.10.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-1.1.s390x",
"product": {
"name": "python310-idle-3.10.15-1.1.s390x",
"product_id": "python310-idle-3.10.15-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-1.1.s390x",
"product": {
"name": "python310-tk-3.10.15-1.1.s390x",
"product_id": "python310-tk-3.10.15-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-3.10.15-1.1.x86_64",
"product": {
"name": "python310-3.10.15-1.1.x86_64",
"product_id": "python310-3.10.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-32bit-3.10.15-1.1.x86_64",
"product": {
"name": "python310-32bit-3.10.15-1.1.x86_64",
"product_id": "python310-32bit-3.10.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-curses-3.10.15-1.1.x86_64",
"product": {
"name": "python310-curses-3.10.15-1.1.x86_64",
"product_id": "python310-curses-3.10.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-dbm-3.10.15-1.1.x86_64",
"product": {
"name": "python310-dbm-3.10.15-1.1.x86_64",
"product_id": "python310-dbm-3.10.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-idle-3.10.15-1.1.x86_64",
"product": {
"name": "python310-idle-3.10.15-1.1.x86_64",
"product_id": "python310-idle-3.10.15-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python310-tk-3.10.15-1.1.x86_64",
"product": {
"name": "python310-tk-3.10.15-1.1.x86_64",
"product_id": "python310-tk-3.10.15-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64"
},
"product_reference": "python310-3.10.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le"
},
"product_reference": "python310-3.10.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.15-1.1.s390x"
},
"product_reference": "python310-3.10.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-3.10.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64"
},
"product_reference": "python310-3.10.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64"
},
"product_reference": "python310-32bit-3.10.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le"
},
"product_reference": "python310-32bit-3.10.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x"
},
"product_reference": "python310-32bit-3.10.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-32bit-3.10.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64"
},
"product_reference": "python310-32bit-3.10.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64"
},
"product_reference": "python310-curses-3.10.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le"
},
"product_reference": "python310-curses-3.10.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x"
},
"product_reference": "python310-curses-3.10.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-curses-3.10.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64"
},
"product_reference": "python310-curses-3.10.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64"
},
"product_reference": "python310-dbm-3.10.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le"
},
"product_reference": "python310-dbm-3.10.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x"
},
"product_reference": "python310-dbm-3.10.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-dbm-3.10.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64"
},
"product_reference": "python310-dbm-3.10.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64"
},
"product_reference": "python310-idle-3.10.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le"
},
"product_reference": "python310-idle-3.10.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x"
},
"product_reference": "python310-idle-3.10.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-idle-3.10.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64"
},
"product_reference": "python310-idle-3.10.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64"
},
"product_reference": "python310-tk-3.10.15-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le"
},
"product_reference": "python310-tk-3.10.15-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x"
},
"product_reference": "python310-tk-3.10.15-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-tk-3.10.15-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
},
"product_reference": "python310-tk-3.10.15-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4030"
}
],
"notes": [
{
"category": "general",
"text": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u0027re not using Windows or haven\u0027t changed the temporary directory location then you aren\u0027t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \"700\" for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4030",
"url": "https://www.suse.com/security/cve/CVE-2024-4030"
},
{
"category": "external",
"summary": "SUSE Bug 1227152 for CVE-2024-4030",
"url": "https://bugzilla.suse.com/1227152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-6232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6232"
}
],
"notes": [
{
"category": "general",
"text": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6232",
"url": "https://www.suse.com/security/cve/CVE-2024-6232"
},
{
"category": "external",
"summary": "SUSE Bug 1230227 for CVE-2024-6232",
"url": "https://bugzilla.suse.com/1230227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-7592"
}
],
"notes": [
{
"category": "general",
"text": "There is a LOW severity vulnerability affecting CPython, specifically the\n\u0027http.cookies\u0027 standard library module.\n\n\nWhen parsing cookies that contained backslashes for quoted characters in\nthe cookie value, the parser would use an algorithm with quadratic\ncomplexity, resulting in excess CPU resources being used while parsing the\nvalue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-7592",
"url": "https://www.suse.com/security/cve/CVE-2024-7592"
},
{
"category": "external",
"summary": "SUSE Bug 1229596 for CVE-2024-7592",
"url": "https://bugzilla.suse.com/1229596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-32bit-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-curses-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-dbm-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-idle-3.10.15-1.1.x86_64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.aarch64",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.ppc64le",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.s390x",
"openSUSE Tumbleweed:python310-tk-3.10.15-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-7592"
}
]
}
bit-python-2024-6232
Vulnerability from bitnami_vulndb
There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "python",
"purl": "pkg:bitnami/python"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.8.20"
},
{
"introduced": "3.9.0"
},
{
"fixed": "3.9.20"
},
{
"introduced": "3.10.0"
},
{
"fixed": "3.10.15"
},
{
"introduced": "3.11.0"
},
{
"fixed": "3.11.10"
},
{
"introduced": "3.12.0"
},
{
"fixed": "3.12.6"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2024-6232"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"id": "BIT-python-2024-6232",
"modified": "2025-11-06T13:25:46.476Z",
"published": "2024-09-16T12:04:20.671Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"type": "WEB",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/09/03/5"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241018-0007/"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html"
}
],
"schema_version": "1.5.0",
"summary": "Regular-expression DoS when parsing TarFile headers"
}
bit-libpython-2024-6232
Vulnerability from bitnami_vulndb
There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "libpython",
"purl": "pkg:bitnami/libpython"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.8.20"
},
{
"introduced": "3.9.0"
},
{
"fixed": "3.9.20"
},
{
"introduced": "3.10.0"
},
{
"fixed": "3.10.15"
},
{
"introduced": "3.11.0"
},
{
"fixed": "3.11.10"
},
{
"introduced": "3.12.0"
},
{
"fixed": "3.12.6"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2024-6232"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"id": "BIT-libpython-2024-6232",
"modified": "2025-11-06T13:25:46.476Z",
"published": "2025-08-11T13:52:51.685Z",
"references": [
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/09/03/5"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"type": "WEB",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241018-0007/"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html"
}
],
"schema_version": "1.6.2",
"summary": "Regular-expression DoS when parsing TarFile headers"
}
NCSC-2025-0020
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:30 - Updated: 2025-01-22 13:30Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse database producten en subsystemen, zoals de Core Database, Graal, Application Express, GoldenGate en REST data.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich in verschillende componenten van de Oracle Database, waaronder de Data Mining component en de Java VM. Deze kwetsbaarheden stellen laaggeprivilegieerde geauthenticeerde gebruikers in staat om het systeem te compromitteren, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie. De Java VM-kwetsbaarheid kan ook leiden tot ongeautoriseerde wijzigingen van gegevens.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Unchecked Error Condition",
"title": "CWE-391"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "general",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2025-01-22T13:30:16.354373Z",
"id": "NCSC-2025-0020",
"initial_release_date": "2025-01-22T13:30:16.354373Z",
"revision_history": [
{
"date": "2025-01-22T13:30:16.354373Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "graal_development_kit_for_micronaut",
"product": {
"name": "graal_development_kit_for_micronaut",
"product_id": "CSAFPID-1751216",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graal_development_kit_for_micronaut:23.5-23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_data_mining",
"product": {
"name": "database_-_data_mining",
"product_id": "CSAFPID-1751200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_data_mining:19.3-19.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_data_mining",
"product": {
"name": "database_-_data_mining",
"product_id": "CSAFPID-1751199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_data_mining:21.3-21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_migration_assistant_for_unicode",
"product": {
"name": "database_migration_assistant_for_unicode",
"product_id": "CSAFPID-1751212",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_migration_assistant_for_unicode:19.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_server",
"product": {
"name": "database_server",
"product_id": "CSAFPID-1503604",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_server:_java_vm___23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_graalvm_multilingual_engine",
"product": {
"name": "database_-_graalvm_multilingual_engine",
"product_id": "CSAFPID-1751223",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:21.4-21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_graalvm_multilingual_engine",
"product": {
"name": "database_-_graalvm_multilingual_engine",
"product_id": "CSAFPID-1751224",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:23.5-23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1751298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1751299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751093",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751094",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751095",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:23.4-23.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1751203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rest_data_services",
"product": {
"name": "rest_data_services",
"product_id": "CSAFPID-711746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rest_data_services",
"product": {
"name": "rest_data_services",
"product_id": "CSAFPID-1751305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:rest_data_services:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rest_data_services",
"product": {
"name": "rest_data_services",
"product_id": "CSAFPID-1751304",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:rest_data_services:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188",
"CSAFPID-1751204",
"CSAFPID-1751203"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188",
"CSAFPID-1751204",
"CSAFPID-1751203"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188",
"CSAFPID-1751204",
"CSAFPID-1751203"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188",
"CSAFPID-1751204",
"CSAFPID-1751203"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45772",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-45772",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45772.json"
}
],
"title": "CVE-2024-45772"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650825",
"CSAFPID-1751298",
"CSAFPID-1751299"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650825",
"CSAFPID-1751298",
"CSAFPID-1751299"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-50379",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-50379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
}
],
"title": "CVE-2024-50379"
},
{
"cve": "CVE-2024-52316",
"cwe": {
"id": "CWE-391",
"name": "Unchecked Error Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Error Condition",
"title": "CWE-391"
},
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-52316",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52316.json"
}
],
"title": "CVE-2024-52316"
},
{
"cve": "CVE-2024-54677",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-54677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
}
],
"title": "CVE-2024-54677"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-21553",
"references": [
{
"category": "self",
"summary": "CVE-2025-21553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21553.json"
}
],
"title": "CVE-2025-21553"
},
{
"cve": "CVE-2025-21557",
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21557",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21557.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2025-21557"
},
{
"cve": "CVE-2022-26345",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751199",
"CSAFPID-1751200"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-26345",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26345.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751199",
"CSAFPID-1751200"
]
}
],
"title": "CVE-2022-26345"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-27043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json"
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-36730",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751203",
"CSAFPID-1751204"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-36730",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36730.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751203",
"CSAFPID-1751204"
]
}
],
"title": "CVE-2023-36730"
},
{
"cve": "CVE-2023-36785",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751203",
"CSAFPID-1751204"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-36785",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36785.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751203",
"CSAFPID-1751204"
]
}
],
"title": "CVE-2023-36785"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650767",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-711746",
"CSAFPID-816845",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-1751212"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650767",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-711746",
"CSAFPID-816845",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-1751212"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52428",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-342816",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-816845",
"CSAFPID-711746",
"CSAFPID-1751216"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-342816",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-816845",
"CSAFPID-711746",
"CSAFPID-1751216"
]
}
],
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6763",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751304",
"CSAFPID-1751305"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751304",
"CSAFPID-1751305"
]
}
],
"title": "CVE-2024-6763"
},
{
"cve": "CVE-2024-6923",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6923",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6923.json"
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-8088",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-8088",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8088.json"
}
],
"title": "CVE-2024-8088"
},
{
"cve": "CVE-2024-8927",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8927",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8927.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-8927"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-21211",
"cwe": {
"id": "CWE-922",
"name": "Insecure Storage of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751223",
"CSAFPID-1751224"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21211",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21211.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751223",
"CSAFPID-1751224"
]
}
],
"title": "CVE-2024-21211"
},
{
"cve": "CVE-2024-22262",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650825",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650825",
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
}
],
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-24789",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24789",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24789.json"
}
],
"title": "CVE-2024-24789"
},
{
"cve": "CVE-2024-24790",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24790",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24790.json"
}
],
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-24791",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
}
],
"title": "CVE-2024-24791"
},
{
"cve": "CVE-2024-28757",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28757",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28757.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503604",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-711746"
]
}
],
"title": "CVE-2024-28757"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33600",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650825"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650825"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650825"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650825"
]
}
],
"title": "CVE-2024-38820"
}
]
}
NCSC-2025-0382
Vulnerability from csaf_ncscnl - Published: 2025-12-09 13:15 - Updated: 2025-12-09 13:15Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Building X, COMOS, Energy Services, Gridscale X, NX, RUGGEDCOM, SICAM, SIMATIC, SINEC, SINEMA, SIPLUS en Solid Edge.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- (Remote) code execution (root/admin rechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Verhogen van rechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)",
"title": "CWE-96"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "Improper Removal of Sensitive Information Before Storage or Transfer",
"title": "CWE-212"
},
{
"category": "general",
"text": "CWE-264",
"title": "CWE-264"
},
{
"category": "general",
"text": "Privilege Chaining",
"title": "CWE-268"
},
{
"category": "general",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Improper Preservation of Permissions",
"title": "CWE-281"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Generation of Predictable Numbers or Identifiers",
"title": "CWE-340"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Improperly Implemented Security Check for Standard",
"title": "CWE-358"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Session Fixation",
"title": "CWE-384"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "CWE-399",
"title": "CWE-399"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Missing Lock Check",
"title": "CWE-414"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Initialization",
"title": "CWE-665"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Release of Invalid Pointer or Reference",
"title": "CWE-763"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Missing Initialization of Resource",
"title": "CWE-909"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "general",
"text": "CWE-1214",
"title": "CWE-1214"
},
{
"category": "general",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-202008.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-212953.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-356310.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-416652.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-420375.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-471761.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-626856.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-710408.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-734261.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-763474.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-868571.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-882673.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-912274.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-915282.html"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-12-09T13:15:05.391966Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0382",
"initial_release_date": "2025-12-09T13:15:05.391966Z",
"revision_history": [
{
"date": "2025-12-09T13:15:05.391966Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Building X - Security Manager Edge Controller (ACC-AP)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "COMOS V10.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "COMOS V10.4.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "COMOS V10.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "COMOS V10.5.2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "COMOS V10.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Energy Services"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Gridscale X Prepay"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "NX V2412"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "NX V2506"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "SICAM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU DIQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU PA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "SIMATIC CN 4100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200AL IM 157-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "SIMATIC PN/PN Coupler"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "SIMATIC S7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "SINEC INS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "SINEC NMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "SINEC PNI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "SIPLUS HCS4200 CIM4210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "SIPLUS NET PN/PN Coupler"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1212 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1214 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CPU 1215 AC/DC/RLY"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1500 CPU 1511-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-300 CPU 314C-2 PN/DP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2025"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2026"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7169",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "other",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "description",
"text": "A vulnerability in shadow 4.5\u0027s newgidmap allows unprivileged users to exploit user namespaces, potentially bypassing access restrictions set by administrators.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-7169 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-7169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-7169"
},
{
"cve": "CVE-2018-9234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "GnuPG versions 2.2.4 and 2.2.5 have a vulnerability (CVE-2018-9234) that allows remote attackers to bypass security restrictions by using a signing subkey for key certification without enforcing the offline master Certify key.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-9234 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-9234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-9234"
},
{
"cve": "CVE-2018-12934",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "The \u0027remember_Ktype\u0027 function in cplus-dem.c of GNU libiberty, present in GNU Binutils 2.30, is susceptible to excessive memory consumption, which may result in out-of-memory conditions during cxxfilt execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-12934 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-12934.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-12934"
},
{
"cve": "CVE-2019-9893",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"notes": [
{
"category": "other",
"text": "Improperly Implemented Security Check for Standard",
"title": "CWE-358"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "description",
"text": "The libseccomp 2.4.1 update resolves a BPF generation bug, enhances syscall tables, addresses CVE-2019-9893, and improves support for various architectures while fixing prior 64-bit syscall argument comparison issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-9893 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-9893.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-9893"
},
{
"cve": "CVE-2019-12900",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "CWE-1214",
"title": "CWE-1214"
},
{
"category": "description",
"text": "The updates for ClamAV version 0.103.0 and bzip2 address multiple security vulnerabilities, including non-blocking database reloads in ClamAV and out-of-bounds writes in bzip2, enhancing overall functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-12900 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-12900.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-12900"
},
{
"cve": "CVE-2019-14866",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Versions of cpio prior to 2.13 have a vulnerability due to improper input validation when generating TAR archives, allowing unauthorized file permissions and paths that could compromise systems upon extraction by high-privilege users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14866.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2019-14866"
},
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and its components, including json-c and libfastjson, have multiple vulnerabilities, particularly an integer overflow and out-of-bounds write issue (CVE-2020-12762) affecting large JSON files, allowing potential arbitrary code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-12762 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-12762.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-21047",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "The libcpu component of elfutils version 0.177 has a denial-of-service vulnerability that can be exploited by attackers through specially crafted ELF files, leading to application crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-21047 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-21047.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-21047"
},
{
"cve": "CVE-2020-22217",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "C-ares versions before 1.16.1 and up to 1.17.0 have a buffer overflow vulnerability in the ares_parse_soa_reply function, addressed by the libcares2 update for CVE-2020-22217.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-22217 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-22217.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-22217"
},
{
"cve": "CVE-2020-35525",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "A NULL pointer dereference vulnerability in SQLite 3.31.1 can cause out-of-memory errors during INTERSECT query processing, potentially leading to Denial of Service attacks in affected NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-35525 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-35525.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2020-35525"
},
{
"cve": "CVE-2021-35550",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "description",
"text": "Recent updates for OpenJDK versions 1.7, 1.8, and 11 address multiple vulnerabilities related to TLS ciphers, memory allocation, and keystore corruption, while Oracle Java SE and GraalVM have critical vulnerabilities allowing unauthorized access to sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35550 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35550.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35550"
},
{
"cve": "CVE-2021-35556",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Recent updates for various Java versions, including IBM and OpenJDK, address multiple vulnerabilities related to memory allocation, weak cipher preferences, and denial of service risks, while enhancing functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35556 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35556.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35556"
},
{
"cve": "CVE-2021-35559",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple updates for Java versions, including IBM and OpenJDK, address various vulnerabilities such as memory allocation issues and weak cipher preferences, while also enhancing functionalities and updating to newer service refreshes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35559 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35559"
},
{
"cve": "CVE-2021-35561",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Recent updates for OpenJDK and Oracle Java SE address multiple vulnerabilities, including weak TLS ciphers, excessive memory allocations, and denial of service risks across various versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35561 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35561"
},
{
"cve": "CVE-2021-35564",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Multiple updates for IBM and OpenJDK Java versions address various vulnerabilities, including excessive memory allocation and weak cipher preferences, while also enhancing functionality and security across several releases.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35564 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35564.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35564"
},
{
"cve": "CVE-2021-35565",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Recent updates for various Java versions, including IBM and OpenJDK, address multiple vulnerabilities related to memory allocation, weak cipher preferences, and denial of service risks, while enhancing functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35565 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35565.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35565"
},
{
"cve": "CVE-2021-35567",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "Recent updates for Java, including OpenJDK and Oracle Java SE, address multiple vulnerabilities related to memory allocation, TLS issues, and unauthorized access, with CVSS scores indicating significant risks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35567 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35567.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35567"
},
{
"cve": "CVE-2021-35578",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Recent updates for Java SE, OpenJDK, and Oracle GraalVM address multiple vulnerabilities, including memory allocation issues, weak TLS ciphers, and denial of service risks, affecting various supported versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35578 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35578.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35578"
},
{
"cve": "CVE-2021-35586",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple updates for Java versions, including IBM and OpenJDK, address various vulnerabilities such as excessive memory allocation and weak cipher preferences, while also enhancing functionality and security across several versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35586 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35586.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35586"
},
{
"cve": "CVE-2021-35588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for IBM Java and OpenJDK address multiple vulnerabilities, including memory allocation issues and weak cipher preferences, while also enhancing versions to Java 7.1 SR5, Java 8.0 SR7, and OpenJDK 8u312 and 7u321.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35588 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35588.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35588"
},
{
"cve": "CVE-2021-35603",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for OpenJDK versions 1.7, 1.8, and 11 address multiple vulnerabilities, including TLS cipher issues and memory allocation problems, while Oracle Java SE and GraalVM Enterprise Edition have vulnerabilities that could compromise data confidentiality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-35603 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-35603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-35603"
},
{
"cve": "CVE-2021-36084",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including use-after-free and Denial of Service risks, potentially allowing attackers to execute arbitrary code or cause service disruptions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36084 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36084.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36084"
},
{
"cve": "CVE-2021-36085",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution risks, affecting various components and products, particularly those utilizing SELinux.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36085 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36085"
},
{
"cve": "CVE-2021-36086",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux versions up to 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution, affecting various components and requiring user interaction or elevated privileges for exploitation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36086 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36086.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36086"
},
{
"cve": "CVE-2021-36087",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Red Hat Enterprise Linux and SELinux 3.2 have multiple vulnerabilities, including denial of service and arbitrary code execution risks, affecting various components and requiring user interaction or elevated privileges for exploitation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-36087 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-36087.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-36087"
},
{
"cve": "CVE-2021-38185",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "GNU cpio version 2.13 is vulnerable to remote code execution due to an integer overflow in the ds_fgetstr function when processing specially crafted pattern files.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-38185 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-38185.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-38185"
},
{
"cve": "CVE-2021-47358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP4 and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks and use-after-free issues, across various kernel versions and components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-47358 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-47358.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-47358"
},
{
"cve": "CVE-2021-47361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 12 and 15 SP5 kernels, including RT and Azure variants, were updated to address multiple security vulnerabilities such as memory leaks and use-after-free issues, enhancing overall system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-47361 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2021/cve-2021-47361.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2021-47361"
},
{
"cve": "CVE-2022-0435",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels and Linux Kernel versions have been updated to address multiple security vulnerabilities, including memory corruption, race conditions, and remote stack overflow issues, alongside various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0435 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0435.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-0492",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels and Linux Kernel versions addressed multiple security vulnerabilities, including privilege escalation, memory corruption, and transient execution side-channel attacks across several service packs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0492 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0492"
},
{
"cve": "CVE-2022-0847",
"cwe": {
"id": "CWE-909",
"name": "Missing Initialization of Resource"
},
"notes": [
{
"category": "other",
"text": "Missing Initialization of Resource",
"title": "CWE-909"
},
{
"category": "other",
"text": "Improper Initialization",
"title": "CWE-665"
},
{
"category": "other",
"text": "Improper Preservation of Permissions",
"title": "CWE-281"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including privilege escalation and memory access issues, alongside mitigations for transient execution side-channel attacks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0847 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0847.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise kernels (12 SP2, SP3, SP4, SP5, and 15 SP1, SP3) were updated to address various security vulnerabilities, including memory leaks, use-after-free, double free issues, and information leak flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-0850 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-0850.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-0850"
},
{
"cve": "CVE-2022-1353",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"notes": [
{
"category": "other",
"text": "Improper Removal of Sensitive Information Before Storage or Transfer",
"title": "CWE-212"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Multiple updates were released for SUSE Linux Enterprise kernels addressing various security vulnerabilities and non-security bugs, including memory management issues, privilege escalation risks, and access control flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1353 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-1353.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1734",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across multiple versions have been updated to address various security vulnerabilities, including RETBLEED, use-after-free issues, and non-security bug fixes, enhancing overall system stability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1734 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-1734.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-2639",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"notes": [
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernel updates across various versions address multiple security vulnerabilities, including race conditions, use-after-free issues, and denial of service, alongside non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2639 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-2639.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2964",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels addressed multiple security vulnerabilities, including use-after-free and memory corruption issues, across several versions and components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2964 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-2964.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-3424",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent updates to various SUSE Linux Enterprise kernels and Linux Kernel versions addressed multiple critical security vulnerabilities, including use-after-free and memory corruption issues, across several components and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-3424 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-3424.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-20141",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across SUSE Linux Enterprise and Linux Kernel versions addressed various security vulnerabilities, including buffer overflows, use-after-free issues, and the RETBLEED attack, alongside non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-20141 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-20141.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-23039",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, buffer overflows, and double free issues, alongside numerous non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23039 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-23039.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-23039"
},
{
"cve": "CVE-2022-23040",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, buffer overflows, and double free issues, alongside numerous non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-23040 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-23040.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-23040"
},
{
"cve": "CVE-2022-24958",
"cwe": {
"id": "CWE-763",
"name": "Release of Invalid Pointer or Reference"
},
"notes": [
{
"category": "other",
"text": "Release of Invalid Pointer or Reference",
"title": "CWE-763"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to SUSE Linux Enterprise kernels and Google Android address multiple security vulnerabilities, including privilege escalations and memory leaks, while NetApp products face risks from flaws in Linux Kernel versions up to 5.16.8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-24958 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-24958.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-24958"
},
{
"cve": "CVE-2022-27223",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP3 and RT kernels were updated to address multiple security vulnerabilities, including CVEs for memory leaks, privilege escalations, and a specific out-of-array access issue in the udc-xilinx driver.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-27223 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-27223.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-27223"
},
{
"cve": "CVE-2022-28390",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise kernels (12 SP2, SP3, SP4, SP5, and 15 SP1, SP3) and various Linux Kernel versions were updated to address multiple security vulnerabilities, including memory leaks, use-after-free, and double free issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-28390 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-28390.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-29872",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated attackers to exploit improper validation of POST request parameters, potentially leading to denial of service or arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29872 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29872.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29872"
},
{
"cve": "CVE-2022-29873",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM T devices (versions \u003c V3.0) allows unauthenticated attackers to exploit improper validation of GET and POST request parameters, leading to potential denial of service or arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29873 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29873.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29873"
},
{
"cve": "CVE-2022-29874",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to capture unencrypted HTTP web traffic, potentially disrupting device functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29874 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29874"
},
{
"cve": "CVE-2022-29876",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit reflected XSS attacks due to improper handling of GET request parameters reflected in the web server response.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29876.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29876"
},
{
"cve": "CVE-2022-29878",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit unencrypted challenge-response communication, potentially gaining access to the device\u0027s management interface.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29878 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29878.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29878"
},
{
"cve": "CVE-2022-29879",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated users to access critical device information due to inadequate access protection in the web-based management interface.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29879 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29879.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29879"
},
{
"cve": "CVE-2022-29880",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows authenticated attackers to exploit improper input validation in the configuration interface, enabling persistent XSS attacks affecting logged-in users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29880 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29880.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29880"
},
{
"cve": "CVE-2022-29881",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated users to access internal configuration details due to inadequate access protection in the web-based management interface.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29881.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29881"
},
{
"cve": "CVE-2022-29882",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in SICAM T (versions \u003c V3.0) allows unauthenticated attackers to exploit improper file handling for XSS attacks, potentially enabling actions on behalf of legitimate users via error logs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29882 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29882.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29882"
},
{
"cve": "CVE-2022-29883",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Vulnerabilities in SICAM P850, P855, and T devices (all versions \u003c V3.00) allow unauthenticated access to web interface pages, enabling attackers to delete log files without authentication.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-29883 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-29883.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-29883"
},
{
"cve": "CVE-2022-30594",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "description",
"text": "Recent kernel updates for SUSE Linux Enterprise and various Linux Kernel versions addressed multiple security vulnerabilities, including the RETBLEED attack, use-after-free issues, buffer overflows, and restriction bypasses related to the PT_SUSPEND_SECCOMP flag.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30594 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-30594.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-31807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "description",
"text": "Vulnerabilities in SiPass integrated AC5102 and ACC-AP devices allow local and remote attackers to upload or modify firmware due to inadequate integrity checks during firmware updates.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-31807 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-31807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-31807"
},
{
"cve": "CVE-2022-34903",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "GnuPGP has multiple vulnerabilities, including signature forgery and status injection issues, while recent updates to gpg2 and Docker images for Dagster-cloud and Spectrafit address these security concerns.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34903 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-34903.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "description",
"text": "The Linux kernel prior to version 5.18.13 contains a vulnerability in the block starting symbol (.bss) that may allow Xen PV guest OS users to perform denial of service attacks or escalate privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36123 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-36123.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-37032",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent updates for Quagga and FRRouting address multiple vulnerabilities, including sensitive information disclosure and denial of service risks due to BGP processing issues and out-of-bounds read vulnerabilities.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37032 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-37032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-37032"
},
{
"cve": "CVE-2022-37434",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "Recent updates to VLC, Oracle products, zlib, and Dagster-cloud address various vulnerabilities, including critical issues in Oracle systems and security fixes in zlib and opencv-python.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37434 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-37434.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-40226",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"notes": [
{
"category": "other",
"text": "Session Fixation",
"title": "CWE-384"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850, P855, and T devices allows session takeover due to the acceptance of user-defined session cookies without renewal after login/logout.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40226 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-40226.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-40226"
},
{
"cve": "CVE-2022-41665",
"cwe": {
"id": "CWE-141",
"name": "Improper Neutralization of Parameter/Argument Delimiters"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Parameter/Argument Delimiters",
"title": "CWE-141"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850, P855 (all versions \u003c V3.10) and SICAM T (all versions \u003c V3.0) devices allows unauthenticated attackers to execute arbitrary code or cause denial of service due to improper GET request parameter validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41665 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-41665.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-41665"
},
{
"cve": "CVE-2022-41858",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels addressed critical security vulnerabilities, including stack overflows, denial of service, memory leaks, and use-after-free issues, enhancing overall system stability and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41858 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-41858.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-43439",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in POWER METER models SICAM Q100, P850, P855, and T allows authenticated remote attackers to crash the device or execute arbitrary code due to improper validation of the Language-parameter in web interface requests.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-43439 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-43439.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-43439"
},
{
"cve": "CVE-2022-48624",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "description",
"text": "Red Hat OpenShift and multiple NetApp products have vulnerabilities in components like \u0027less\u0027, allowing local attackers to execute arbitrary commands, manipulate files, or disclose sensitive information due to improper handling of shell metacharacters.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48624 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48624.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48624"
},
{
"cve": "CVE-2022-48626",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5, 15 SP2, SP3, SP4, and SP5 were updated to address multiple security vulnerabilities, including use-after-free issues, memory leaks, and kernel panics.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48626 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48626.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48626"
},
{
"cve": "CVE-2022-48919",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including memory leaks, null pointer dereferences, and race conditions, with numerous CVEs resolved.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48919 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48919.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48919"
},
{
"cve": "CVE-2022-48926",
"cwe": {
"id": "CWE-414",
"name": "Missing Lock Check"
},
"notes": [
{
"category": "other",
"text": "Missing Lock Check",
"title": "CWE-414"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP3, SP4, and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks, race conditions, and null pointer dereferences, along with various non-security bug fixes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48926 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48926.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48926"
},
{
"cve": "CVE-2022-48948",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP4 and SP5 kernels were updated to address multiple security vulnerabilities, including memory leaks, use-after-free issues, and a buffer overflow in the USB gadget\u0027s setup handler.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48948"
},
{
"cve": "CVE-2022-48951",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5 and 15 SP4/SP5, including Azure and RT variants, received updates addressing multiple security vulnerabilities such as memory leaks and use-after-free issues, alongside driver-related fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48951 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48951.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48951"
},
{
"cve": "CVE-2022-48960",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels, including 15 SP5, 15 SP4, and 12 SP5, addressed critical security vulnerabilities such as use-after-free and memory leaks in network and display drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48960 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48960.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48960"
},
{
"cve": "CVE-2022-48962",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple updates across various SUSE Linux Enterprise kernels (15 SP5, 15 SP4, 15 SP3, 15 SP2, 12 SP5) addressed critical security vulnerabilities, including use-after-free and memory leak issues in network and display components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48962"
},
{
"cve": "CVE-2022-48966",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP5 and 12 SP5 kernels received updates addressing multiple security vulnerabilities, including memory leaks, use-after-free issues, and out-of-bounds access across various components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48966 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48966.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48966"
},
{
"cve": "CVE-2022-48967",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across various versions have been updated to address multiple security vulnerabilities, including use-after-free issues and memory leaks in networking and display components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-48967 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-48967.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-48967"
},
{
"cve": "CVE-2022-49058",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "SUSE Linux Enterprise kernels across versions 12 SP5 and 15 SP3 to SP5 have been updated to address multiple security vulnerabilities, including race conditions, buffer overflows, and memory management issues, alongside various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-49058 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-49058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2022-49058"
},
{
"cve": "CVE-2023-4641",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "other",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "description",
"text": "Recent updates address multiple vulnerabilities across various platforms, including Oracle Communications, Red Hat OpenShift, and shadow-utils, affecting user account management and potentially leading to unauthorized access and data leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4641 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-4641.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-4641"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates for Python 3.11 and earlier versions address multiple security vulnerabilities, particularly in email parsing and libexpat, alongside various non-security improvements and fixes for CVEs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28322",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Recent updates for macOS Ventura, Monterey, and Big Sur address multiple security vulnerabilities, while curl updates fix various flaws, including use-after-free and information disclosure issues, alongside a critical vulnerability in Oracle Enterprise Manager.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28322 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-28322.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-29383",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "The shadow update addresses CVE-2023-29383 related to /etc/shadow manipulation, resolves control character injection vulnerabilities in Shadow 4.13, and includes various non-security bug fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-29383.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29491",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent updates for macOS Ventura, Monterey, and Big Sur address critical vulnerabilities, while Oracle, Red Hat OpenShift, and ncurses have multiple security flaws that could lead to system compromise and denial-of-service conditions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29491 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-29491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-29491"
},
{
"cve": "CVE-2023-30901",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "description",
"text": "SICAM P850 and P855 devices (all versions \u003c V3.11) are vulnerable to Cross-Site Request Forgery attacks, allowing unauthorized actions via malicious links targeting authenticated users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-30901 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-30901.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-30901"
},
{
"cve": "CVE-2023-31238",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "description",
"text": "A vulnerability in SICAM P850 and P855 devices (all versions \u003c V3.11) allows attackers to impersonate legitimate users by exploiting missing cookie protection flags and accessing session tokens.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-31238 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-31238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-31238"
},
{
"cve": "CVE-2023-41358",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "The frr and quagga updates address multiple vulnerabilities, including issues with BGP attributes, zero-length NLRIs, and denial of service risks, enhancing overall stability and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-41358 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-41358.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-41358"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Communications products, curl, and Siemens products allow unauthorized access, data manipulation, and potential Denial-of-Service, with CVSS scores of 6.5 for specific Oracle vulnerabilities.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46753",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "The FRRouting 8.5.6 update addresses multiple vulnerabilities, including crashes from crafted BGP UPDATE messages and malformed MP_REACH_NLRI data, while enhancing PIM/PIMv6/BGP and VRF support.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46753 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-46753.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-46753"
},
{
"cve": "CVE-2023-47234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "The frr 8.5.6 update addresses multiple vulnerabilities in BGP UPDATE processing, including denial-of-service issues and crashes from malformed messages and improper attribute handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-47234 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-47234.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2023-47234"
},
{
"cve": "CVE-2024-0397",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Recent updates for Python interpreters and Oracle Database Server address multiple security vulnerabilities, including denial of service risks and memory race conditions, alongside various bug fixes and enhancements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-5642",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to Python address multiple security vulnerabilities, including buffer overreads and email header injection, affecting versions up to 3.9 and impacting various NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5642 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-5642.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-5642"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Recent updates to various Python versions address multiple vulnerabilities, including denial of service and excessive resource consumption, particularly in the tarfile and http.cookies modules, alongside Oracle Database patches for significant vulnerabilities.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6923",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "Recent updates for various Python versions, including venv-salt-minion, address multiple security vulnerabilities, particularly email header injection and resource consumption issues, alongside numerous bug fixes and enhancements.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6923 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-6923.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-6923"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "Recent updates for Python 3.x and Oracle products address multiple security vulnerabilities, including denial of service, excessive resource consumption, and email header injection, with varying severity levels across different versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "Multiple vulnerabilities in curl and Oracle products, including credential leakage and unauthorized data access, affect various versions of software, notably impacting cURL and Oracle Communications Unified Assurance.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-11168",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Recent updates for Python address CVE-2024-11168, fixing improper validation of IPv6 and IPvFuture addresses, and resolving vulnerabilities in the `urllib.parse.urlsplit()` and `urlparse()` functions that could lead to SSRF exploits.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11168 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-11168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-11168"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Cloud Native Core Policy, and GNU libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-12243",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "A flaw in GnuTLS related to inefficient DER decoding in libtasn1 can lead to denial-of-service conditions, affecting multiple NetApp products and identified as CVE-2024-12243.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12243 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-12243"
},
{
"cve": "CVE-2024-28085",
"cwe": {
"id": "CWE-268",
"name": "Privilege Chaining"
},
"notes": [
{
"category": "other",
"text": "Privilege Chaining",
"title": "CWE-268"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "The util-linux update addresses critical vulnerabilities, particularly in the \u0027wall\u0027 command, neutralizing escape sequences to prevent account takeover and other potential exploits in versions up to 2.40.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28085 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28085.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-32487",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)",
"title": "CWE-96"
},
{
"category": "description",
"text": "The Less text file viewer has an OS command execution vulnerability due to mishandled newline characters in file names, affecting multiple NetApp products and allowing remote command execution when the LESSOPEN variable is set.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32487 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-32487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-47875",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "DOMPurify has addressed a nesting-based mXSS vulnerability in versions 2.5.0 and 3.1.3, while HPE Private Cloud AI has identified remote exploit vulnerabilities.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47875 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47875.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-47875"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Communications Cloud Native Core services and libexpat allow unauthenticated denial of service attacks, with CVSS scores of 5.9, affecting various versions and components.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52533",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and Gnome Glib versions prior to 2.82.1 expose systems to unauthorized access and buffer overflow risks, potentially leading to data compromise and service disruptions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52533 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-52533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-52533"
},
{
"cve": "CVE-2024-56835",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II (versions \u003c V2.17.0) allows code injection in the DHCP Server configuration file, enabling attackers to gain root access via a reverse shell.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56835"
},
{
"cve": "CVE-2024-56836",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II family versions prior to V2.17.0 allows attackers to inject parameters during Dynamic DNS configuration, potentially leading to root access via a reverse shell.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56836 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56836.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56836"
},
{
"cve": "CVE-2024-56837",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "description",
"text": "A vulnerability in the RUGGEDCOM ROX II family (versions \u003c V2.17.0) allows attackers to gain root access through insufficient validation during configuration file handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56837 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56837.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56837"
},
{
"cve": "CVE-2024-56838",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II devices (versions \u003c V2.17.0) allows attackers to execute arbitrary code as root due to the SCEP client\u0027s failure to validate multiple fields during secure certificate enrollment.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56838 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56838.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56838"
},
{
"cve": "CVE-2024-56839",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX II (versions \u003c V2.17.0) allows code injection via VRF, enabling attackers to execute arbitrary code with root privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56839 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56839.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56839"
},
{
"cve": "CVE-2024-56840",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "description",
"text": "A vulnerability in the RUGGEDCOM ROX II family (versions \u003c V2.17.0) allows code injection via IPsec, enabling attackers to execute arbitrary code with root privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56840 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-56840.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2024-56840"
},
{
"cve": "CVE-2025-0938",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6, 3.11, 3.12, and 3.13.5 address security vulnerabilities related to improper URL parsing of domain names with square brackets, which violate RFC 3986 and could lead to unauthorized data manipulation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0938 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0938.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-0938"
},
{
"cve": "CVE-2025-2783",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Palo Alto Networks has addressed vulnerabilities in Prisma\u00ae Access Browser and highlighted a high-severity sandbox escape flaw in Google Chrome on Windows, linked to an incorrect handle in Mojo.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/AU:N/R:U/V:D/RE:L/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-2783 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-2783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-2783"
},
{
"cve": "CVE-2025-10148",
"cwe": {
"id": "CWE-340",
"name": "Generation of Predictable Numbers or Identifiers"
},
"notes": [
{
"category": "other",
"text": "Generation of Predictable Numbers or Identifiers",
"title": "CWE-340"
},
{
"category": "description",
"text": "Recent updates to curl (version 8.14.1) address critical security vulnerabilities, including cache poisoning risks in WebSocket code and a denial of service flaw in Oracle Communications Unified Inventory Management.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-10148 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-10148.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-10148"
},
{
"cve": "CVE-2025-40800",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "description",
"text": "A vulnerability in various versions of COMOS, NX, Simcenter 3D, Simcenter Femap, and Solid Edge products allows for potential man-in-the-middle attacks due to the IAM client not validating server certificates for TLS connections.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40800 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40800.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40800"
},
{
"cve": "CVE-2025-40801",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "description",
"text": "A vulnerability in COMOS, NX, Simcenter, and Tecnomatix products arises from the SALT SDK\u0027s failure to validate server certificates for TLS connections, risking man-in-the-middle attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40801 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40801"
},
{
"cve": "CVE-2025-40806",
"cwe": {
"id": "CWE-204",
"name": "Observable Response Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "description",
"text": "A vulnerability in Gridscale X Prepay (versions \u003c V4.2.1) allows unauthenticated remote attackers to perform user enumeration, potentially facilitating brute force attacks on valid users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40806 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40806.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40806"
},
{
"cve": "CVE-2025-40807",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "description",
"text": "A vulnerability in Gridscale X Prepay (versions \u003c V4.2.1) allows locked-out users to exploit capture-replay of authentication tokens, enabling them to establish valid sessions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40807 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40807"
},
{
"cve": "CVE-2025-40818",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "description",
"text": "A vulnerability in SINEMA Remote Connect Server (versions \u003c V3.2 SP4) allows unauthorized access to private SSL/TLS keys, enabling attackers to impersonate the server and conduct man-in-the-middle attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40818 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40818.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40818"
},
{
"cve": "CVE-2025-40819",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "A vulnerability in SINEMA Remote Connect Server (versions \u003c V3.2 SP4) allows unauthorized modification of the system_ticketinfo table, enabling database users to bypass licensing restrictions and modify database values directly.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40819 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40819"
},
{
"cve": "CVE-2025-40820",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "description",
"text": "The document outlines a vulnerability in certain products that lack TCP sequence number validation, enabling unauthenticated remote attackers to disrupt TCP-based services through the injection of spoofed IP packets.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40820 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40820"
},
{
"cve": "CVE-2025-40830",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "description",
"text": "A vulnerability in SINEC Security Monitor (versions \u003c V4.10.0) allows lowly privileged authenticated local attackers to read or write any file on the server or sensor due to inadequate authorization checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40830 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40830.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40830"
},
{
"cve": "CVE-2025-40831",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in SINEC Security Monitor versions prior to V4.10.0 allows lowly privileged authenticated attackers to exploit input validation issues in the date parameter during report generation, potentially causing a denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40831 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40831.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40831"
},
{
"cve": "CVE-2025-40935",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM devices (versions below V5.10.1) allows authenticated remote attackers to exploit improper input validation during TLS certificate uploads, potentially leading to device crashes and Denial of Service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40935 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40935.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40935"
},
{
"cve": "CVE-2025-40938",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) exposes sensitive firmware information, compromising the device\u0027s confidentiality, integrity, and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40938 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40938.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40938"
},
{
"cve": "CVE-2025-40939",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) allows an attacker with physical access to exploit an unauthenticated USB port, potentially causing a denial of service by triggering a reboot.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40939 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40939.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40939"
},
{
"cve": "CVE-2025-40940",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (versions \u003c V4.0.1) leads to inconsistent SNMP behavior, potentially allowing unauthorized access to sensitive data and compromising confidentiality.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40940 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40940.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40940"
},
{
"cve": "CVE-2025-40941",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 (all versions \u003c V4.0.1) allows affected devices to expose server information in their responses, potentially aiding attackers with network access in targeted attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40941 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40941.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-40941"
},
{
"cve": "CVE-2025-59392",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "description",
"text": "Elspec G5 devices up to version 1.2.2.19 have a vulnerability that allows physical access to reset the Admin password using a USB drive with a specific reset string.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59392 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59392.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2025-59392"
},
{
"cve": "CVE-2018-1000876",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "The update for binutils version 2.32 addresses multiple security vulnerabilities, including memory access issues and buffer overflows, while also introducing support for new architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2018-1000876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2018/cve-2018-1000876.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32"
]
}
],
"title": "CVE-2018-1000876"
}
]
}
NCSC-2025-0021
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:30 - Updated: 2025-01-22 13:30Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-01-22T13:30:50.189632Z",
"id": "NCSC-2025-0021",
"initial_release_date": "2025-01-22T13:30:50.189632Z",
"revision_history": [
{
"date": "2025-01-22T13:30:50.189632Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1727475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751254",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1751303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1751300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1751253",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1751090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1751246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1751231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1751241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751230",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1751243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-1751218",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-916906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41727",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json"
}
],
"title": "CVE-2022-41727"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5981",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
}
],
"title": "CVE-2023-5981"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-7256",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2023-7256"
},
{
"cve": "CVE-2023-29407",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29407",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2023-29407"
},
{
"cve": "CVE-2023-29408",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2023-29408"
},
{
"cve": "CVE-2023-40577",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-40577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2023-40577"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46604",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46604",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
}
],
"title": "CVE-2023-46604"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650777",
"CSAFPID-1650778",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-1442",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1442",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-1442"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "other",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-7885",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7885",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-7885"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-24791",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-24791"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27309",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27309",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-27309"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-28835",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28835"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33600",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "other",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47535"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-47803",
"cwe": {
"id": "CWE-209",
"name": "Generation of Error Message Containing Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47803"
},
{
"cve": "CVE-2024-47804",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47804"
},
{
"cve": "CVE-2024-49766",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49766",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-49766"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50379",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-50379"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2024-54677",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-54677"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-21542",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21542",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21542"
},
{
"cve": "CVE-2025-21544",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21544",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21544"
},
{
"cve": "CVE-2025-21554",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21554"
}
]
}
NCSC-2025-0023
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:31 - Updated: 2025-01-22 13:31Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle PeopleSoft, specifiek in de versies 8.60, 8.61 en 9.2.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in Oracle PeopleSoft stellen geauthenticeerde kwaadwillenden in staat om via HTTP-netwerktoegang ongeautoriseerde toegang te krijgen tot specifieke gegevens, wat kan leiden tot ongeautoriseerde gegevensmanipulatie en -toegang. Kwaadwillenden kunnen ook een Denial-of-Service veroorzaken. Hiervoor heeft de kwaadwillende geen voorafgaande authenticatie nodig.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden in PeopleSoft te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle PeopleSoft",
"tracking": {
"current_release_date": "2025-01-22T13:31:17.380797Z",
"id": "NCSC-2025-0023",
"initial_release_date": "2025-01-22T13:31:17.380797Z",
"revision_history": [
{
"date": "2025-01-22T13:31:17.380797Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "peoplesoft_enterprise_cc_common_application_objects",
"product": {
"name": "peoplesoft_enterprise_cc_common_application_objects",
"product_id": "CSAFPID-449779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_cc_common_application_objects:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_fin_cash_management",
"product": {
"name": "peoplesoft_enterprise_fin_cash_management",
"product_id": "CSAFPID-765405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_cash_management:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_fin_esettlements",
"product": {
"name": "peoplesoft_enterprise_fin_esettlements",
"product_id": "CSAFPID-1751153",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_esettlements:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_hcm_human_resources",
"product": {
"name": "peoplesoft_enterprise_hcm_human_resources",
"product_id": "CSAFPID-172663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_human_resources:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_hcm_shared_components",
"product": {
"name": "peoplesoft_enterprise_hcm_shared_components",
"product_id": "CSAFPID-607590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_shared_components:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-816362",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503669",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503673",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_scm_purchasing",
"product": {
"name": "peoplesoft_enterprise_scm_purchasing",
"product_id": "CSAFPID-172660",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_scm_purchasing:9.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-22218",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-22218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-22218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2020-22218"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1682",
"CSAFPID-1681",
"CSAFPID-816362",
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1503676",
"CSAFPID-1503678"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1682",
"CSAFPID-1681",
"CSAFPID-816362",
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1503676",
"CSAFPID-1503678"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1681",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22019",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-1682",
"CSAFPID-816362",
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1503676",
"CSAFPID-1503678"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1681",
"CSAFPID-1682",
"CSAFPID-816362",
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1503676",
"CSAFPID-1503678"
]
}
],
"title": "CVE-2024-22019"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-27280",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-27280"
},
{
"cve": "CVE-2024-27281",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27281",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27281.json"
}
],
"title": "CVE-2024-27281"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27282",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27282.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-27282"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-37372",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2025-21530",
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21530",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21530.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1681",
"CSAFPID-816362"
]
}
],
"title": "CVE-2025-21530"
},
{
"cve": "CVE-2025-21537",
"product_status": {
"known_affected": [
"CSAFPID-765405"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21537",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21537.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-765405"
]
}
],
"title": "CVE-2025-21537"
},
{
"cve": "CVE-2025-21539",
"product_status": {
"known_affected": [
"CSAFPID-1751153"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21539",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21539.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751153"
]
}
],
"title": "CVE-2025-21539"
},
{
"cve": "CVE-2025-21545",
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21545",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21545.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1681",
"CSAFPID-816362"
]
}
],
"title": "CVE-2025-21545"
},
{
"cve": "CVE-2025-21561",
"product_status": {
"known_affected": [
"CSAFPID-172660"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-172660"
]
}
],
"title": "CVE-2025-21561"
},
{
"cve": "CVE-2025-21562",
"product_status": {
"known_affected": [
"CSAFPID-449779"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21562",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21562.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-449779"
]
}
],
"title": "CVE-2025-21562"
},
{
"cve": "CVE-2025-21563",
"product_status": {
"known_affected": [
"CSAFPID-449779"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21563",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21563.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-449779"
]
}
],
"title": "CVE-2025-21563"
}
]
}
NCSC-2024-0411
Vulnerability from csaf_ncscnl - Published: 2024-10-17 13:15 - Updated: 2024-10-17 13:15Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CWE-18",
"title": "CWE-18"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2024-10-17T13:15:19.595269Z",
"id": "NCSC-2024-0411",
"initial_release_date": "2024-10-17T13:15:19.595269Z",
"revision_history": [
{
"date": "2024-10-17T13:15:19.595269Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph_mapviewer",
"product": {
"name": "spatial_and_graph_mapviewer",
"product_id": "CSAFPID-912561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-764250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-816800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning_-_micronaut",
"product": {
"name": "fleet_patching_and_provisioning_-_micronaut",
"product_id": "CSAFPID-1673492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning",
"product": {
"name": "fleet_patching_and_provisioning",
"product_id": "CSAFPID-1503603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-1673525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-816801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-1673405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_administration",
"product": {
"name": "application_express_administration",
"product_id": "CSAFPID-764731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_customers_plugin",
"product": {
"name": "application_express_customers_plugin",
"product_id": "CSAFPID-764732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_team_calendar_plugin",
"product": {
"name": "application_express_team_calendar_plugin",
"product_id": "CSAFPID-764733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-266119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-764779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-89587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-187448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-94075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-220886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-611394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-816317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-912567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1503612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1673479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_essbase",
"product": {
"name": "oracle_essbase",
"product_id": "CSAFPID-1650506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1673404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data",
"product": {
"name": "goldengate_big_data",
"product_id": "CSAFPID-764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-764752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-1673384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-816846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-611390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-764803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_veridata",
"product": {
"name": "goldengate_veridata",
"product_id": "CSAFPID-764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-219912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_stream_analytics",
"product": {
"name": "oracle_goldengate_stream_analytics",
"product_id": "CSAFPID-1650515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-764861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-1503640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_studio",
"product": {
"name": "oracle_goldengate_studio",
"product_id": "CSAFPID-1650835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate",
"product": {
"name": "oracle_goldengate",
"product_id": "CSAFPID-1650575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_nosql_database",
"product": {
"name": "oracle_nosql_database",
"product_id": "CSAFPID-1650584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_secure_backup",
"product": {
"name": "oracle_secure_backup",
"product_id": "CSAFPID-1650563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_sql_developer",
"product": {
"name": "oracle_sql_developer",
"product_id": "CSAFPID-1650638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-220643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-1673397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "oracle_application_express",
"product": {
"name": "oracle_application_express",
"product_id": "CSAFPID-1673144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle_corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-220886",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764822",
"CSAFPID-1650515",
"CSAFPID-1650638",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-89587",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json"
}
],
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-34169",
"cwe": {
"id": "CWE-192",
"name": "Integer Coercion Error"
},
"notes": [
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-36033",
"cwe": {
"id": "CWE-87",
"name": "Improper Neutralization of Alternate XSS Syntax"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-36033"
},
{
"cve": "CVE-2022-37454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
}
],
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38136",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-38136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json"
}
],
"title": "CVE-2022-38136"
},
{
"cve": "CVE-2022-40196",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json"
}
],
"title": "CVE-2022-40196"
},
{
"cve": "CVE-2022-41342",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json"
}
],
"title": "CVE-2022-41342"
},
{
"cve": "CVE-2022-42919",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-46337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
}
],
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-4759",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4759",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-4759"
},
{
"cve": "CVE-2023-4863",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json"
}
],
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-26031",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-26031"
},
{
"cve": "CVE-2023-26551",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-44981",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
}
],
"title": "CVE-2023-44981"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49083",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2408",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-2408"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5458",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-21131",
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"product_status": {
"known_affected": [
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"product_status": {
"known_affected": [
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21147",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-21233",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-21233"
},
{
"cve": "CVE-2024-21242",
"product_status": {
"known_affected": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
}
],
"title": "CVE-2024-21242"
},
{
"cve": "CVE-2024-21251",
"product_status": {
"known_affected": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
}
],
"title": "CVE-2024-21251"
},
{
"cve": "CVE-2024-21261",
"product_status": {
"known_affected": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-21261"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-23944",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23944",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23944"
},
{
"cve": "CVE-2024-24989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json"
}
],
"title": "CVE-2024-24989"
},
{
"cve": "CVE-2024-24990",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24990",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-24990"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-28887",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-28887"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-31079",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-31079"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-34161",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-34161"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35200",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-35200"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-36387"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37372",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-38356",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38356"
},
{
"cve": "CVE-2024-38357",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38357"
},
{
"cve": "CVE-2024-38472",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38472"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38474",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38474"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39573",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-39884",
"cwe": {
"id": "CWE-18",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-18",
"title": "CWE-18"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39884",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39884"
},
{
"cve": "CVE-2024-40725",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40725",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40725"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-45801"
}
]
}
WID-SEC-W-2025-0225
Vulnerability from csaf_certbund - Published: 2025-01-30 23:00 - Updated: 2025-04-09 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0225 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0225.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0225 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0225"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-022 vom 2025-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2804 vom 2025-04-02",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2804.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
}
],
"source_lang": "en-US",
"title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-04-09T22:00:00.000+00:00",
"generator": {
"date": "2025-04-10T08:15:47.247+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0225",
"initial_release_date": "2025-01-30T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.3.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.0.0",
"product_id": "T040718"
}
},
{
"category": "product_version",
"name": "8.3.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.0.0",
"product_id": "T040718-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.20",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.20",
"product_id": "T040719"
}
},
{
"category": "product_version",
"name": "7.13.1.20",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.20",
"product_id": "T040719-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.20"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.50",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.50",
"product_id": "T040721"
}
},
{
"category": "product_version",
"name": "7.10.1.50",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.50",
"product_id": "T040721-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.50"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4235",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2013-4235"
},
{
"cve": "CVE-2015-8100",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2017-9271",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2017-9271"
},
{
"cve": "CVE-2018-6798",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2018-6798"
},
{
"cve": "CVE-2018-6913",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2018-6913"
},
{
"cve": "CVE-2019-20633",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2019-20633"
},
{
"cve": "CVE-2019-20892",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2020-12762",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-15861",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2021-3521",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-3521"
},
{
"cve": "CVE-2021-37750",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-37750"
},
{
"cve": "CVE-2021-46933",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-46933"
},
{
"cve": "CVE-2021-46955",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-46955"
},
{
"cve": "CVE-2021-47074",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47074"
},
{
"cve": "CVE-2021-47113",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47113"
},
{
"cve": "CVE-2021-47131",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47131"
},
{
"cve": "CVE-2021-47162",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47162"
},
{
"cve": "CVE-2021-47171",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47171"
},
{
"cve": "CVE-2021-47188",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47188"
},
{
"cve": "CVE-2021-47206",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47206"
},
{
"cve": "CVE-2021-47220",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47220"
},
{
"cve": "CVE-2021-47229",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47229"
},
{
"cve": "CVE-2021-47231",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47231"
},
{
"cve": "CVE-2021-47235",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47235"
},
{
"cve": "CVE-2022-2601",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-3775",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-3775"
},
{
"cve": "CVE-2022-44792",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-44792"
},
{
"cve": "CVE-2022-44793",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-44793"
},
{
"cve": "CVE-2022-48566",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-48566"
},
{
"cve": "CVE-2023-27043",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28074",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-28074"
},
{
"cve": "CVE-2023-3164",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-3164"
},
{
"cve": "CVE-2023-36632",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-36632"
},
{
"cve": "CVE-2023-4421",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-4421"
},
{
"cve": "CVE-2023-44487",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45288",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-45733",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45733"
},
{
"cve": "CVE-2023-45745",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45745"
},
{
"cve": "CVE-2023-45918",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45918"
},
{
"cve": "CVE-2023-46103",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-46103"
},
{
"cve": "CVE-2023-4692",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-4692"
},
{
"cve": "CVE-2023-47233",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-47855",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-47855"
},
{
"cve": "CVE-2023-49083",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-50782",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-50782"
},
{
"cve": "CVE-2023-52425",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2023-52428",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2023-52527",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52527"
},
{
"cve": "CVE-2023-52586",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52586"
},
{
"cve": "CVE-2023-52591",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52591"
},
{
"cve": "CVE-2023-52646",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52646"
},
{
"cve": "CVE-2023-52653",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52655",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52664",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52664"
},
{
"cve": "CVE-2023-52685",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52685"
},
{
"cve": "CVE-2023-52686",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52691",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52691"
},
{
"cve": "CVE-2023-52696",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52696"
},
{
"cve": "CVE-2023-52698",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52698"
},
{
"cve": "CVE-2023-52703",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52703"
},
{
"cve": "CVE-2023-52730",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52732",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52732"
},
{
"cve": "CVE-2023-52741",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52741"
},
{
"cve": "CVE-2023-52742",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52742"
},
{
"cve": "CVE-2023-52747",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52747"
},
{
"cve": "CVE-2023-52759",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52759"
},
{
"cve": "CVE-2023-52774",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52781",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52781"
},
{
"cve": "CVE-2023-52796",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52821",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52821"
},
{
"cve": "CVE-2023-52864",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52875",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52880",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52880"
},
{
"cve": "CVE-2023-5388",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5388"
},
{
"cve": "CVE-2023-5752",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5752"
},
{
"cve": "CVE-2023-5992",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5992"
},
{
"cve": "CVE-2023-6597",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-0639",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0639"
},
{
"cve": "CVE-2024-0727",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-1737",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-1737"
},
{
"cve": "CVE-2024-1975",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-1975"
},
{
"cve": "CVE-2024-2004",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-20696",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-20696"
},
{
"cve": "CVE-2024-22195",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-2398",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-24577",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-24577"
},
{
"cve": "CVE-2024-24790",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-2511",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-25710",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26458",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26458"
},
{
"cve": "CVE-2024-26461",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26461"
},
{
"cve": "CVE-2024-26625",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26739",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26739"
},
{
"cve": "CVE-2024-26752",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26775",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26775"
},
{
"cve": "CVE-2024-26791",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26828",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26828"
},
{
"cve": "CVE-2024-26846",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26846"
},
{
"cve": "CVE-2024-26874",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26874"
},
{
"cve": "CVE-2024-26876",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26876"
},
{
"cve": "CVE-2024-26900",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26915",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26915"
},
{
"cve": "CVE-2024-26920",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26921",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26929",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26929"
},
{
"cve": "CVE-2024-26930",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26931",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26931"
},
{
"cve": "CVE-2024-26934",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26957",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26957"
},
{
"cve": "CVE-2024-26958",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26984",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26984"
},
{
"cve": "CVE-2024-26996",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26996"
},
{
"cve": "CVE-2024-27008",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27008"
},
{
"cve": "CVE-2024-27054",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27054"
},
{
"cve": "CVE-2024-27059",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27062",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27388",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27396",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27398",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27398"
},
{
"cve": "CVE-2024-27401",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27401"
},
{
"cve": "CVE-2024-27419",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27436",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-28085",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-2961",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-32487",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-33599",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-33871",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33871"
},
{
"cve": "CVE-2024-34062",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34062"
},
{
"cve": "CVE-2024-34064",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34459",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34459"
},
{
"cve": "CVE-2024-35195",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-35235",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35235"
},
{
"cve": "CVE-2024-35789",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35791",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35791"
},
{
"cve": "CVE-2024-35809",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35809"
},
{
"cve": "CVE-2024-35811",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35830",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35830"
},
{
"cve": "CVE-2024-35849",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35878",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35887",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35895",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35914",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35914"
},
{
"cve": "CVE-2024-35932",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35932"
},
{
"cve": "CVE-2024-35935",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35944",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35955",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35969",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35982",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-36015",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36029",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36029"
},
{
"cve": "CVE-2024-3651",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-3651"
},
{
"cve": "CVE-2024-36954",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38428",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-39689",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-39689"
},
{
"cve": "CVE-2024-4032",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-41110",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-41110"
},
{
"cve": "CVE-2024-4317",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4317"
},
{
"cve": "CVE-2024-4741",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5206",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-5206"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6232",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6345",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6345"
},
{
"cve": "CVE-2024-6655",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6655"
},
{
"cve": "CVE-2024-7264",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-53295",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-53295"
},
{
"cve": "CVE-2024-51534",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-51534"
},
{
"cve": "CVE-2024-53296",
"product_status": {
"known_affected": [
"T040719",
"T040718",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-53296"
}
]
}
WID-SEC-W-2025-0794
Vulnerability from csaf_certbund - Published: 2025-04-13 22:00 - Updated: 2025-06-04 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um seine Privilegien zu erh\u00f6hen, um einen Denial of Service Zustand herbeizuf\u00fchren und um andere, nicht n\u00e4her spezifizierte Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0794 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0794.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0794 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0794"
},
{
"category": "external",
"summary": "Juniper Security Bulletin JSA96447 vom 2025-04-09",
"url": "https://supportportal.juniper.net/s/article/2025-04-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R3-release?language=en_US"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20047-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html"
}
],
"source_lang": "en-US",
"title": "Juniper Junos Space: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-04T22:00:00.000+00:00",
"generator": {
"date": "2025-06-05T06:16:59.318+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0794",
"initial_release_date": "2025-04-13T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c24.1R3",
"product": {
"name": "Juniper Junos Space \u003c24.1R3",
"product_id": "T042758"
}
},
{
"category": "product_version",
"name": "24.1R3",
"product": {
"name": "Juniper Junos Space 24.1R3",
"product_id": "T042758-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r3"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47596",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2021-47596"
},
{
"cve": "CVE-2022-24808",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2022-24808"
},
{
"cve": "CVE-2022-39253",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2022-39253"
},
{
"cve": "CVE-2023-28746",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-48161",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2023-48161"
},
{
"cve": "CVE-2023-6597",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2024-0450",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-1737",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-1737"
},
{
"cve": "CVE-2024-1975",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-1975"
},
{
"cve": "CVE-2024-21208",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-21208"
},
{
"cve": "CVE-2024-21210",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-21210"
},
{
"cve": "CVE-2024-21217",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-21217"
},
{
"cve": "CVE-2024-21235",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-21235"
},
{
"cve": "CVE-2024-21823",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-21823"
},
{
"cve": "CVE-2024-23271",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-23271"
},
{
"cve": "CVE-2024-26735",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-26735"
},
{
"cve": "CVE-2024-26852",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-26852"
},
{
"cve": "CVE-2024-26993",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-26993"
},
{
"cve": "CVE-2024-27052",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-27052"
},
{
"cve": "CVE-2024-27820",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-27820"
},
{
"cve": "CVE-2024-27838",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-27838"
},
{
"cve": "CVE-2024-27851",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-27851"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-2961",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-32002",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-32002"
},
{
"cve": "CVE-2024-32004",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-32004"
},
{
"cve": "CVE-2024-32020",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-32020"
},
{
"cve": "CVE-2024-32021",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-32021"
},
{
"cve": "CVE-2024-32465",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-32465"
},
{
"cve": "CVE-2024-33599",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-35845",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-35845"
},
{
"cve": "CVE-2024-35899",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-35899"
},
{
"cve": "CVE-2024-3651",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-3651"
},
{
"cve": "CVE-2024-3652",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-3652"
},
{
"cve": "CVE-2024-36971",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-36971"
},
{
"cve": "CVE-2024-39487",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-39487"
},
{
"cve": "CVE-2024-4076",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-4076"
},
{
"cve": "CVE-2024-40782",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-40782"
},
{
"cve": "CVE-2024-40789",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-40789"
},
{
"cve": "CVE-2024-40866",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-40866"
},
{
"cve": "CVE-2024-40954",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-40954"
},
{
"cve": "CVE-2024-40958",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-40958"
},
{
"cve": "CVE-2024-42284",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-42284"
},
{
"cve": "CVE-2024-42472",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-42472"
},
{
"cve": "CVE-2024-44187",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-44187"
},
{
"cve": "CVE-2024-6232",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7006",
"product_status": {
"known_affected": [
"T002207",
"T042758"
]
},
"release_date": "2025-04-13T22:00:00.000+00:00",
"title": "CVE-2024-7006"
}
]
}
WID-SEC-W-2024-2047
Vulnerability from csaf_certbund - Published: 2024-09-03 22:00 - Updated: 2025-06-12 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Python ist eine universelle, \u00fcblicherweise interpretierte, h\u00f6here Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Python ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2047 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2047.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2047 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2047"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2024-09-03",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"category": "external",
"summary": "Python Security Annoubce vom 2024-09-03",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
},
{
"category": "external",
"summary": "CVE Database",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C1D8FD5694 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c1d8fd5694"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-E887A10DEE vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e887a10dee"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-F2FC325C40 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-f2fc325c40"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-F3FF13F3C2 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-f3ff13f3c2"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-F750328C3B vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-f750328c3b"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-091E2C7801 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-091e2c7801"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-1D0CB3B43F vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1d0cb3b43f"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-39D459DD00 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-39d459dd00"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-6DEF755315 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-6def755315"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-7DC0F381F1 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-7dc0f381f1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-E453A209E9 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e453a209e9"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-02027448D8 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-02027448d8"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-2B163F9201 vom 2024-09-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2b163f9201"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-37D9C902DD vom 2024-09-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-37d9c902dd"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-F652468298 vom 2024-09-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-f652468298"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-7DB9258D37 vom 2024-09-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-7db9258d37"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-7A069F48E4 vom 2024-09-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-7a069f48e4"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-308628EBB8 vom 2024-09-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-308628ebb8"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-1E6D6F8452 vom 2024-09-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1e6d6f8452"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7015-1 vom 2024-09-16",
"url": "https://ubuntu.com/security/notices/USN-7015-1"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14340-1 vom 2024-09-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EB3HULWLZQ24PRVM3P2LCSJ3IJUISSTW/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14346-1 vom 2024-09-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBWVORMJLTP5YM7GG2KA4LSPGF6N5YVF/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14346-1 vom 2024-09-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/UBWVORMJLTP5YM7GG2KA4LSPGF6N5YVF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3303-1 vom 2024-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019454.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14345-1 vom 2024-09-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XGNLIXONZEJPUCB2A4GVFSDMNJ37VXYU/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14345-1 vom 2024-09-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XGNLIXONZEJPUCB2A4GVFSDMNJ37VXYU/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7015-2 vom 2024-09-19",
"url": "https://ubuntu.com/security/notices/USN-7015-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3357-1 vom 2024-09-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LIDNXNV744GNUVXIRCBTY2Q4CIZ3PIEN/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6909 vom 2024-09-23",
"url": "https://access.redhat.com/errata/RHSA-2024:6909"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6975 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6975"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3384-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019496.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3411-1 vom 2024-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019505.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3411-1 vom 2024-09-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QNXFOIXBCGZTXD6BKYGBL3VDWS6RK6AB/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3430-1 vom 2024-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019513.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3418-1 vom 2024-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019511.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3427-1 vom 2024-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019516.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-6975 vom 2024-09-25",
"url": "https://linux.oracle.com/errata/ELSA-2024-6975.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3447-1 vom 2024-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019530.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3470-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3BRXVUEQCIBOPTQPNHGCO3VXFI46RYDG/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7415 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7415"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7443 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7443"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7015-3 vom 2024-10-01",
"url": "https://ubuntu.com/security/notices/USN-7015-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7647 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7647"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7726 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7726"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7725 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7725"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7724 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7724"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7323 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7323"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7015-4 vom 2024-10-14",
"url": "https://ubuntu.com/security/notices/USN-7015-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8130 vom 2024-10-15",
"url": "https://access.redhat.com/errata/RHSA-2024:8130"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8359 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8359"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8374 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8374"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8374 vom 2024-10-23",
"url": "https://linux.oracle.com/errata/ELSA-2024-8374.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8446 vom 2024-10-24",
"url": "https://access.redhat.com/errata/RHSA-2024:8446"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8447 vom 2024-10-24",
"url": "https://access.redhat.com/errata/RHSA-2024:8447"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8359 vom 2024-10-25",
"url": "https://linux.oracle.com/errata/ELSA-2024-8359.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8446 vom 2024-10-24",
"url": "https://linux.oracle.com/errata/ELSA-2024-8446.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8447 vom 2024-10-25",
"url": "https://linux.oracle.com/errata/ELSA-2024-8447.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8447 vom 2024-10-25",
"url": "https://errata.build.resf.org/RLSA-2024:8447"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8490 vom 2024-10-28",
"url": "https://access.redhat.com/errata/RHSA-2024:8490"
},
{
"category": "external",
"summary": "F5 Security Advisory K000148252 vom 2024-10-25",
"url": "https://my.f5.com/manage/s/article/K000148252"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8374 vom 2024-10-25",
"url": "https://errata.build.resf.org/RLSA-2024:8374"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8446 vom 2024-10-25",
"url": "https://errata.build.resf.org/RLSA-2024:8446"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8504 vom 2024-10-28",
"url": "https://access.redhat.com/errata/RHSA-2024:8504"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8797 vom 2024-11-04",
"url": "https://access.redhat.com/errata/RHSA-2024:8797"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8838 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8836 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8836"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8977 vom 2024-11-07",
"url": "https://access.redhat.com/errata/RHSA-2024:8977"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8838 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8838.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8836 vom 2024-11-08",
"url": "http://linux.oracle.com/errata/ELSA-2024-8836.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8838 vom 2024-11-08",
"url": "https://errata.build.resf.org/RLSA-2024:8838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9468 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9468"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9450 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9450"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9451 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9451"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASPYTHON3.8-2024-016 vom 2024-11-13",
"url": "https://alas.aws.amazon.com/AL2/ALASPYTHON3.8-2024-016.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2694 vom 2024-11-15",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2694.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7015-5 vom 2024-11-19",
"url": "https://ubuntu.com/security/notices/USN-7015-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9450 vom 2024-11-19",
"url": "https://linux.oracle.com/errata/ELSA-2024-9450.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9451 vom 2024-11-19",
"url": "https://linux.oracle.com/errata/ELSA-2024-9451.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9468 vom 2024-11-21",
"url": "https://linux.oracle.com/errata/ELSA-2024-9468.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7015-6 vom 2024-11-22",
"url": "https://ubuntu.com/security/notices/USN-7015-6"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3980 vom 2024-12-02",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1750 vom 2025-02-24",
"url": "https://access.redhat.com/errata/RHSA-2025:1750"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1750 vom 2025-03-19",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-March/017343.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7229443 vom 2025-03-28",
"url": "https://www.ibm.com/support/pages/node/7229443"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7488-1 vom 2025-05-06",
"url": "https://ubuntu.com/security/notices/USN-7488-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20154-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20374-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021414.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20065-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021256.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202506-07 vom 2025-06-12",
"url": "https://security.gentoo.org/glsa/202506-07"
}
],
"source_lang": "en-US",
"title": "Python: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-06-12T22:00:00.000+00:00",
"generator": {
"date": "2025-06-13T06:58:43.893+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-2047",
"initial_release_date": "2024-09-03T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-09-09T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2024-09-19T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-09-24T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2024-09-25T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-06T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-22T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-10-24T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-10-27T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, Red Hat und F5 aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-03T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-11-07T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-10T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-11-21T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-01T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-02-23T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Gentoo aufgenommen"
}
],
"status": "final",
"version": "43"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "on Cloud Pak for Data",
"product": {
"name": "IBM DB2 on Cloud Pak for Data",
"product_id": "T042208",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:on_cloud_pak_for_data"
}
}
}
],
"category": "product_name",
"name": "DB2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "CPython \u003c3.13.0rc2",
"product": {
"name": "Open Source Python CPython \u003c3.13.0rc2",
"product_id": "T037272"
}
},
{
"category": "product_version",
"name": "CPython 3.13.0rc2",
"product": {
"name": "Open Source Python CPython 3.13.0rc2",
"product_id": "T037272-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:python:python:cpython__3.13.0rc2"
}
}
}
],
"category": "product_name",
"name": "Python"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-6232",
"product_status": {
"known_affected": [
"67646",
"T042208",
"T012167",
"T004914",
"T032255",
"74185",
"T038741",
"T037272",
"2951",
"T002207",
"T034392",
"T000126",
"T027843",
"T001663",
"398363"
]
},
"release_date": "2024-09-03T22:00:00.000+00:00",
"title": "CVE-2024-6232"
}
]
}
GHSA-MMM5-WGVP-WP8R
Vulnerability from github – Published: 2024-09-03 15:30 – Updated: 2025-11-04 00:31There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
{
"affected": [],
"aliases": [
"CVE-2024-6232"
],
"database_specific": {
"cwe_ids": [
"CWE-1333"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-09-03T13:15:05Z",
"severity": "HIGH"
},
"details": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.",
"id": "GHSA-mmm5-wgvp-wp8r",
"modified": "2025-11-04T00:31:20Z",
"published": "2024-09-03T15:30:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6232"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/issues/121285"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/pull/121286"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf"
},
{
"type": "WEB",
"url": "https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html"
},
{
"type": "WEB",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241018-0007"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/09/03/5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2024-6232
Vulnerability from fkie_nvd - Published: 2024-09-03 13:15 - Updated: 2025-11-03 23:177.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| cna@python.org | https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4 | Patch | |
| cna@python.org | https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06 | Patch | |
| cna@python.org | https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4 | Patch | |
| cna@python.org | https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d | Patch | |
| cna@python.org | https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877 | Patch | |
| cna@python.org | https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf | Patch | |
| cna@python.org | https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373 | Patch | |
| cna@python.org | https://github.com/python/cpython/issues/121285 | Exploit, Issue Tracking, Patch | |
| cna@python.org | https://github.com/python/cpython/pull/121286 | Issue Tracking, Patch | |
| cna@python.org | https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/09/03/5 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20241018-0007/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| python | python | * | |
| python | python | * | |
| python | python | * | |
| python | python | * | |
| python | python | * | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 | |
| python | python | 3.13.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109",
"versionEndExcluding": "3.8.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9365E878-106E-49B6-98FC-9FA339CD5216",
"versionEndExcluding": "3.9.20",
"versionStartIncluding": "3.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD756EB-DF07-4485-A2AA-59FBD7260A21",
"versionEndExcluding": "3.10.15",
"versionStartIncluding": "3.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EE0E5D8-452F-4862-9C23-23AC1DDEFB1E",
"versionEndExcluding": "3.11.10",
"versionStartIncluding": "3.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4E662B-59E4-495E-941E-2246D2168B42",
"versionEndExcluding": "3.12.6",
"versionStartIncluding": "3.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*",
"matchCriteriaId": "3BA51E41-D221-431F-870F-536AF2867B50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "978582FF-B8F3-479F-AE77-359E9AEE6F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "84E3F62C-7218-4DC3-8473-8A576739643A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha3:*:*:*:*:*:*",
"matchCriteriaId": "1FD15706-B8BC-4801-9F93-06771F2E12C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha4:*:*:*:*:*:*",
"matchCriteriaId": "0FDC359F-E8ED-4777-83FB-1EC63F095CBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha5:*:*:*:*:*:*",
"matchCriteriaId": "6893BDDE-4D90-4592-8701-C6B3FFEB0CFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha6:*:*:*:*:*:*",
"matchCriteriaId": "E316F712-F03A-4378-8192-D1640819698B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "8566F034-27CB-422E-950B-DCAA926CF64F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "EACCE6C3-7701-4966-9D88-E949C82FCA46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "A4853BF2-9C27-465F-9840-5B37013C9F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B266541A-E877-4CAD-A1EF-08A069441F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:python:3.13.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8384A34C-50CD-439C-A2BB-DEA6161342C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a MEDIUM severity vulnerability affecting CPython.\n\n\n\n\n\nRegular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de gravedad MEDIA que afecta a CPython. Las expresiones regulares que permit\u00edan un retroceso excesivo durante el an\u00e1lisis de cabeceras tarfile.TarFile son vulnerables a ReDoS a trav\u00e9s de archivos tar manipulados espec\u00edficamente."
}
],
"id": "CVE-2024-6232",
"lastModified": "2025-11-03T23:17:30.710",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-09-03T13:15:05.363",
"references": [
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf"
},
{
"source": "cna@python.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373"
},
{
"source": "cna@python.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/python/cpython/issues/121285"
},
{
"source": "cna@python.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/python/cpython/pull/121286"
},
{
"source": "cna@python.org",
"tags": [
"Vendor Advisory"
],
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2024/09/03/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20241018-0007/"
}
],
"sourceIdentifier": "cna@python.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
],
"source": "cna@python.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.